1. Bowman-Perrott, L., Burke, M.D., Zaini, S.: Intrusion detection model and algorithm based on multi dimensional data stream mining technology. J. Comput. Res. Dev. 46(4), 602–609 (2016)
2. Farraj, A., Hammad, E., Daoud, A.A., Kundur, D.: Data stream frequent pattern mining based on time decay model. Acta Automatica Sinica 36(5), 77–86 (2016)
3. De Clerck, D., Demeulemeester, E.: Towards a more competitive PPP procurement market: a game-theoretical analysis. J. Manag. Eng. 32(6), 106–115 (2016)
4. Hamdar, S.H., Khoury, H., Zehtabi, S.: A simulator-based approach for modeling longitudinal driving behavior in construction work zones: exploration and assessment. Simul. Trans. Soc. Model. Simul. Int. 92(6), 579–594 (2016)
5. Lin, K.-Y., Lin, J.-C., Chen, J.-M., et al.: Defense automatic malicious tools based on navigation behavior. J. Discrete Math. Sci. Crypt. 13(1), 17–27 (2010)