Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference25 articles.
1. Chen, P.S., Lin, S.C., Sun, C.H.: Simple and effective method for detecting abnormal internet behaviors of mobile devices. Inf. Sci. 321, 193–204 (2015)
2. Chen, J., Peng, J., Zhi, X., et al.: Research on application classification method in cloud computing environment. J. Supercomput. 73(8), 3488–3507 (2017)
3. Zhu, Q.: Research on data location method under the cloud computing environment. In: International Conference on Electrical, Computer Engineering and Electronics (2015)
4. Zhang, P., Xu, J., Muazu, H., et al.: Access control research on data security in Cloud computing. In: IEEE International Conference on Communication Technology. IEEE, pp. 873–877 (2015)
5. Wang, J.Y., Liu, Y.Z., Wang, J.K.: A data-stream-based abnormal data mining in web texts environment. J. Comput. Methods Sci. Eng. 16(2), 361–368 (2016)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献