1. Z. Bu, T. Dirro, P. Greve, Y. Lin, D. Marcus, F. Paget, et al., “McAfee Threats Report: Second Quarter2012,” McAfee Inc., Retrieved November 30, 2012 2. VirusTotal, “File Statistics,” (https://www.virustotal.com/en/statistics/, accessed November 2015) 3. F. Jiang, Y. Fu, B. Gupta, F. Lou, S. Rho, F. Meng, et al., “Deep Learning based Multi-Channel Intelligent Attack Detection for Data Security,” IEEE transactions on Sustainable Computing, Vol. 5, No. 2, pp. 204-212, January 2018 4. A. Bala and C. Inderveer, “Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing,” International Journal of Computer Science Issues (IJCSI), Vol. 9, No. 1, pp. 288-293, July 2012 5. L. H. Chiang, E. L. Russell,R. D. Braatz, “Fault Detection and Diagnosis in Industrial Systems,” Springer Science and Business Media, 2000 6. J. Gao, X. Bai,W. T. Tsai, “Cloud Testing-Issues, Challenges, Needs and Practice,” Software Engineering: An International Journal, Vol. 1, No. 1, pp. 9-23, September 2011 7. R. Buyya, R. N. Calheiros,X. Li, “Autonomic Cloud Computing: Open Challenges and Architectural Elements,” inProceedings of 2012 Third International Conference on Emerging Applications of Information Technology, pp. 3-10, Kolkata, India, November 2012 8. H. C. Shin, H. R. Roth, M. Gao, L. Lu, Z. Xu, I. Nogues, et al., “Deep Convolutional Neural Networks for Computer-Aided Detection: CNN Architectures, Dataset Characteristics and Transfer Learning,” IEEE Transactions on Medical Imaging, Vol. 35, No. 5, pp. 1285-1298, February 2016 9. Y. Du, W. Wang,L. Wang, “Hierarchical Recurrent Neural Network for Skeleton Based Action Recognition,” inProceedings of 28th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015), pp. 1110-1118, Boston, MA, USA, June 2015 10. A. C. Bahnsen, “Building AI Applications using Deep Learning,” 11 (https://blog.easysol.net/wp-content/uploads/2017/06/image1.png, accessed June 2016) 11. G. Venkataramani, B. Roemer, Y. Solihin,M. Prvulovic, “Memtracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging,” inProceedings of IEEE 13th International Symposium on High Performance Computer Architecture, pp. 273-284, Scottsdale, AZ, USA, February 2007 12. G. Novark, E. D. Berger,B. G. Zorn, “Exterminator: Automatically Correcting Memory Errors with High Probability,” inProceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 1-11, California, USA, June 2007 13. D. Ramotsoela, A. Abu-Mahfouz,G. Hancke, “A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study,” Sensors, Vol. 18, No. 8, pp. 2491-2498, May 2018 14. A. Fujino, N. Ueda,K. Saito, “A Hybrid Generative/Discriminative Approach to Semi-Supervised Classifier Design,” inProceedings of the Twentieth National Conference on Artificial Intelligence, pp. 764-769, Pittsburgh, Pennsylvania, July 2005 15. O. Adewumi and A. A. Akinyelu, “A Survey of Machine-Learning and Nature-Inspired based Credit Card Fraud Detection Techniques,” International Journal of System Assurance Engineering and Management, Vol. 8, No. 2, pp. 937-953, February 2017 16. D. Kwon, H. Kim, J. Kim, S. C. Suh, I. Kim,K. J. Kim, “A Survey of Deep Learning-based Network Anomaly Detection,” Cluster Computing, Vol. 22, pp. 949-961, September 2017 17. M. Mohammadi, A. Al-Fuqaha, S. Sorour,M. Guizani, “Deep Learning for IoT Big Data and Streaming Analytics: A Survey,” arXiv:1712.04301, 2017 18. J. E. Ball, D. T. Anderson,C. S. Chan, “Comprehensive Survey of Deep Learning in Remote Sensing: Theories, Tools, and Challenges for the Community,” Journal of Applied Remote Sensing, Vol. 11, No. 4, pp. 042609, September 2017 19. D. Kingma and J. Ba, “Adam: A Method for Stochastic Optimization,” arXiv: 1412.6980, December 2014 20. F. Travostino, P. Daspit, L. Gommans, C. Jog, C. Laat, J. Mambretti, et al., “Seamless Live Migration of Virtual Machines over the MAN/WAN,” Future Generation Computer Systems, Vol. 22, No. 8, pp. 901-907, October 2006 |