1. Ou, Z., Song, M., et al.: Key techniques for Mobile Peer-to-Peer Networks. Journal of Software 19(2), 404–418 (2008)
2. Cheng, J.J., Li, Y.H., Cheng, S.D., et al.: The architecture on the mobile P2P system and the study for the key technology. Journal of Beijing University of Posts and Telecommunications 29(4), 86–89 (2006)
3. Zhu, X., Chen, D., et al.: Pareto Multi objective Genetic Algorithm with Multiple-Chromosomes Crossover. Acta Electronica Sinica 29(1), 106–109 (2001)
4. Qing, H., Jiang, J., et al.: Research on intrusion detection techniques. Journal of China Institute of Communications 25(7), 19–29 (2004)
5. Cabrera, J.B.D., Gutierrez, C., Mehra, R.K.: Ensemble method for anomaly detection and distributed intrusion detection in mobile. Ad Hoc Networks 9(1), 96–119 (2008)