Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference30 articles.
1. Zhang, R., Wu, K., Li, M., et al. (2016). Online resource
scheduling under concave pricing for cloud computing. IEEE Transactions on Parallel & Distributed Systems, 27(4), 1131–1145.
2. Yan, Q., Yu, R., Gong, Q., et al. (2016). Software-Ddefined networking (SDN) and distributed denial
of Service (DDoS) attacks in cloud computing environments: A survey, some
research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.
3. Geng, X., Li, Q., Ye, D., et al (2017). Intrusion detection algorithm based on rough weightily averaged one-dependence estimators. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of ence and Technology, 41(4), 420–427.
4. Xia, Z., Wang, X., Zhang, L., et al (2017). A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Transactions on Information Forensics & Security, 11(11), 2594–2608.
5. Xia, Z., Wang, X., Zhang, L., et al. (2017). A privacy-preserving
and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics & Security, 11(11), 2594–2608.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献