1. Scheduling intrusion detection systems in resource-bounded cyber-physical systems;Abbas,2015
2. Mutual information-based feature selection for intrusion detection systems;Amiri;J. Netw. Comput. Appl.,2011
3. A view of cloud computing;Armbrust;Commun. ACM,2010
4. Autonomic scaling of cloud computing resources using bn-based prediction models;Bashar,2013
5. Coordination and Social Structures in an Open Source Project: VideoLAN, Free/Open Source Software Development;Basset,2005