[1] KOLIAS C,KOLIAS V,KAMBOURAKIS G.TermID:a distributed swarm intelligence-based approach for wireless intrusion detection[J].International Journal of Information Security,2017,16(4):401-416. [2] INAYAT Z,GANI A,ANUAR N,et al.Cloud-based intrusion detection and response system:open research issues,and solutions[J].Arabian Journal for Science and Engineering,2017,42(2):399-423. [3] ZHOU Weiwei,YU Bin.Optimal defense strategy in WSNs based on the game of multi-stage intrusion detection[J].Journal of Electronics & Information Technology,2018,40(1):63-71.(in Chinese) 周伟伟,郁滨.WSNs多阶段入侵检测博弈最优策略研究[J].电子与信息学报,2018,40(1):63-71. [4] MOHAN D,AMALANATHAN G M.A survey on long term evolution scheduling in data mining[J].Wireless Personal Communications,2018,102(3):2363-2387. [5] CHENG M,SU J,XU J.Real-time pre-processing system with hardware accelerator for mobile core networks[J].Frontiers of Information Technology & Electronic Engineering,2017,18(11):1720-1731. [6] DU Hua,ZHANG Tiantian,LI Meihong.Information density based bayes algorithm for cloud platform intrusion detection[J].Journal of System Simulation,2018,30(2):714-730.(in Chinese) 杜哗,张田甜,黎妹红.基于信息密度贝叶斯算法的云平台入侵检测[J].系统仿真学报,2018,30(2):714-730. [7] FAROOQ M U,WASEEM M,QADRI M T.Understanding 5G wireless cellular network:challenges,emerging research directions and enabling technologies[J].Wireless Personal Communications,2017,95(2):261-285. [8] TARUNPREET B,VERMA A K.Data security in mobile cloud computing paradigm:a survey,taxonomy and open research issues[J].The Journal of Supercomputing,2017,73(6):2558-2631. [9] LABIB M,MAROJEVIC V,REED J H,et al.Extending LTE into the unlicensed spectrum:technical analysis of the proposed variants[J].IEEE Communications Standards Magazine,2017,1(4):31-39. [10] ZHANG Jian,CAI Changliang,GONG Liangyi,et al.Research on anomaly behavior detection technology in virtualization environment based on KVM[J].Netinfo Security,2017,15(11):1-6.(in Chinese) 张健,蔡长亮,宫良一,等.基于KVM虚拟化环境的异常行为检测技术研究[J].信息网络安全,2017,15(11):1-6. [11] ALNOMAN A,ANPALAGAN A.Towards the fulfillment of 5G network requirements:technologies and challenges[J].Telecommunication Systems,2017,65(1):101-116. [12] ROY A,CHAPORKAR P,KARANDIKAR A.Optimal radio access technology selection algorithm for LTE-WiFi network[J].IEEE Transactions on Vehicular Technology,2018,67(7):6446-6460. [13] CHEN Jieqing,MAO Guoqiang.On the security of warning message dissemination in vehicular ad hoc networks[J].Journal of Communications and Information Networks,2017,2(2):46-58. [14] MAZHAR R M,AHMAD A,PAUL A,et al.Advanced computing model for geosocial media using big data analytics[J].Multimedia Tools and Applications,2017,76(23):24767-24787. [15] SCHWARZ G J,HAUSCHILDT P H,STARRFIELD S,et al.Non-LTE model atmosphere analysis of the early ultraviolet spectra of Nova OS Andromedae[J].Monthly Notices of the Royal Astronomical Society,1997,28(3):669-684. [16] HUANG Y,TAN J,LIANG Y.Wireless big data:transforming heterogeneous networks to smart networks[J].Journal of Communications and Information Networks,2017,2(1):19-32. [17] WU C,YOSHINAGA T,CHEN X,et al.Cluster-based content distribution integrating LTE with fuzzy logic and Q-learning[J].IEEE Computational Intelligence Magazine,2018,13(1):41-50. [18] ZAIDAN A A,ZAIDAN B B,QAHTAN M Y,et al.A survey on communication components for IoT-based technologies in smart homes[J].Telecommunication Systems,2018,69(1):1-25. [19] ZERMANE H,MOUSS H.Development of an internet and fuzzy based control system of manufacturing process[J].International Journal of Automation and Computing,2017,14(6):706-718. [20] LIN X,YAJNANARAYANA V,MURUGANATHAN S D,et al.The sky is not the limit:LTE for unmanned aerial vehicles[J].IEEE Communications Magazine,2018,56(4):204-210. |