参考文献
[1]Min Weidong,Liu Yonghui,Ke Yongzhen,et al.Using Particle Swarm Optimization Algorithm to Improve Multi-agents Network Management[J].Journal of Computational Information Systems,2014,10(2):739-746.
[2]Liu Yonghui,Min Weidong.Network Management Based on Domain Partition for Mobile Agents[M]//Yin Hujun,Tang Ke,Yang Gao,et al.Intelligent Data Engineering and Automated Learning.Berlin,Germany:Springer,2013:153-160.
[3]Min Weidong,Chen Ke,Ke Yongzhen.A Matrix Grammar Approach for Automatic Distributed Network Resource Management[J].Frontiers of Computer Science,2013,7(4):583-594.
[4]Min Weidong.Distributed Network Resources Monitoring Based on Multi-agent and Matrix Grammar[C]//Pro-ceedings of the 4th International Symposium on Parallel Archi-tectures,Algorithms and Programming.Washington D.C.,USA:IEEE
Computer Society,2011:136-140.
[5]Chen Xu,Mao Yun.DECOR:Declarative Network Management and Operation[J].ACM SIGCOMM Computer Communication Review,2009,40(1):61-66.
[6]de Paola A,Fiduccia S,Gaglio S,et al.Rule Based Reasoning for Network Management[C]//Proceedings of Computer Architecture for Machine Perception.Washington D.C.,USA:IEEE Computer Society,2005:25-30.
[7]Suarez-Tangil G,Palomar E,Fuentes J M D,et al.Automatic Rule Generation Based on Genetic Programming for Event Correlation[M]//Alvaro H,Paolo G,Rodolfo Z.Computational Intelligence in Security for Information
Systems.Berlin,Germany:Springer,2009:127-134.
[8]Liu Jun,Martinez L,Calzada A,et al.A Novel Belief Rule Base Representation,Generation and Its Inference Methodology[J].Knowledge-Based Systems,2013,53(9):129-141.
[9]Shim K S,Yoon S H,Lee S K,et al.Automatic Generation of Snort Content Rule for Network Traffic Analysis[J].Journal of Korean Institute of Communications & Information Sciences,2015,40(4):666-677.
[10]Jiang Feng,Sui Yuefei.A Novel Approach for Discretization of Continuous Attributes in Rough Set Theory[J].Knowledge-Based Systems,2014,73(1):324-334.
[11]Peng Yuqing,Liu Gengqian,Geng Hengshan.Application of Rough Set Theory in Network Fault Diagnosis[C]//Pro-ceedings of the 3rd International Conference on Information Technology and Applications.Sydney,Australia:IEEE Computer
Society,2005:556-559.
[12]Qu Zhiming,Wang Xiaoli.Study of Rough Set and Clus-tering Algorithm in Network Security Management[C]//Proceedings of International Conference on Networks Security,Wireless Communications and Trusted Com-puting.Washington
D.C.,USA:IEEE Computer Society,2009:326-329.
[13]胡清华,于达仁,谢宗霞.基于邻域粒化和粗糙逼近的数值属性约简[J].软件学报,2008,19(3):640-649.
[14]Meng You,Yu Lang,Luan Zhongzhi,et al.A Black-box Approach for Detecting the Failure Traces[J].Communi-cations in Computer & Information Science,2014,426:252-259.
[15]牟琦,龚尚福,毕孝儒,等.基于快速属性约简的网络入侵特征选择[J].计算机工程,2011,37(17):113-115.
编辑陆燕菲 |