1. Network anomaly detection in the cloud: the challenges of virtual service migration;Adamova,2014
2. Hybrid intrusion detection model based on ordered sequences;Alharby,2005
3. Simplified fuzzy rule-based systems using non-parametric antecedents and relative data density;Angelov,2011
4. DKSM: subverting virtual machine introspection for fun and profit;Bahram,2006
5. The ordering of multivariate data;Barnett;J. Royal Stat. Soc. Series A,1976