Author:
Zhao Guosheng,Qu Xiaofeng,Liao Yuting,Wang Tiantian,Zhang Jingting
Publisher
Springer Science and Business Media LLC
Reference18 articles.
1. Ryan M D. Cloud computing security: The scientific challenge and a survey of solutions [J]. The Journal of Systems and Software, 2013, 86(9): 2263–2268.
2. Li M J, Luo A, Tong T S, et al. Artificial immune algorithm and its applications [J]. Control Theory & Applications, 2004, 21(2): 153–157(Ch).
3. Xu H, Zhao J M, Cheng X Y, et al. Research and design of survivable network system inspired by biological immunology [J]. Journal of Computer Applications, 2010, 30(5): 1194–1197(Ch).
4. Zhou W J, Zhang D P, Xu B W, et al. An adaptive algorithm of locating fault interactions based combinatorial testing [J]. Chinese Journal of Computers, 2011, 34(8): 1509–1518(Ch).
5. Kelly E J. An adaptive detection algorithm [J]. IEEE Transactions on Aerospace and Electronic Systems, 1986, 22(2): 115–127.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献