|
Songling Fu, “Distributed Online Social Network Data Storage and Optimization Research”, National Defense Science and Technology University, 2014.
|
|
Xiaoshi Fan, Ying Lei and Yanan Wang, Intuitionistic Fuzzy Inference Method in Traffic Anomaly Detection”, Chinese Journal of Electronics and Information Technology, (4): 2218-2224, 2015.
|
|
Cunchen Li, “Research and Application of Mass Data Distributed Storage Technology”, Beijing University of Posts and Telecommunications, 2013.
|
|
Cikou Liu, Feng Wang and Mingchuan Yang, “Research on Distributed Storage Technology for Large Data”, Telecommunications Technology", vol.5, pp.33-36, 2015.
|
|
Nerbu Li, “Distributed Anomaly Detection of Data Mining and Multi Stage Intrusion Alert Correlation Based on Research”, Jilin University, 2010.
|
|
Shuai Liu, “Research on Multi-level Anomaly Behavior Analysis and Detection Technology for Network Data Stream”, The PLA Information Engineering University, 2015.
|
|
Yang Pan, “Research on the Application of Hadoop Technology in Distributed Data Storage”, Dalian Maritime University, 2015.
|
|
Yizhou Qian, “Distributed Real-time Database with High Performance Data Storage Cloud Retrieval Mechanism”, Zhejiang University, 2012.
|
|
Shanqi Tao, “Research and Implementation of Intrusion Detection System for Mining Association Rules Based on Snort”, Nanjing University of Aeronautics, 2009.
|
|
Yu Wang, “Data Redundancy and Maintenance Technology in Distributed Storage System”, South China University of Technology, 2011.
|
|
Dongsheng Xu, Xiaoyan Ai, “Anomaly Intrusion Detection Based on Genetic Optimization and Fuzzy Rule Mining”, Computer applications, vol.6, pp. 2227-2229, 2009.
|
|
Zhengmin Xia, “Study on Network Traffic Analysis and Anomaly Detection Based on Fractal”, Shanghai Jiao Tong University, 2012.
|
|
Zhuoluo Yang, “Research and Implementation of Distributed Storage Technology in Data Warehouse”, Kunming University of Science and Technology, 2012.
|
|
Zhenqian Yang and Yongdan Yang, “Development and Application of Distributed Storage Technology for Large Data. Electronics and Software Engineering”, vol.2, pp.201-210, 2016.
|
|
Ling Zhang, “Research on Intrusion Detection Model Based on Rough Set and Artificial Immune”, Beijing University of Posts and Telecommunications, 2014.
|
|
Yuping Zhou, “Research on the Key Technology of Intrusion Detection Based on Intelligent Soft Computing”, Donghua University, 2010.
|