1. Zhang Y Q, Wang X F, Liu X F, et al. Survey on cloud computing security. Journal of Software, 2016, 27(6): 1328-1348 (in Chinese)
2. Liu Y L, Jia X F, Yan Y, et al. Cloud security situation awareness method based on gray theory. Proceedings of the 4th National Conference on Information Security Grade Protection Technology, 2015, Jul 2-4, Beijing, China, 2015: 21-24 (in Chinese)
3. Lü H Y, Peng W, Wang R M, et al. A real-time network threat recognition and assessment method based on association analysis of time and space. Journal of Computer Research and Development, 2014, 51(5): 1039-1049 (in Chinese)
4. Wang Y Z, Li J Y, Meng K, et al. Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets. Security and Communication Networks, 2013, 6(1): 89-99
5. Chatterjee S, Nigam S, Singh J B, et al. Software fault prediction using nonlinear autoregressive with exogenous inputs (NARX) network. Applied Intelligence, 2012, 37(1): 121-129.
6. Yang W J, Zhang J Y, Wang C D, et al. Situation prediction of large-scale Internet of things network security. EURASIP Journal on Information Security, 2019: Article 13/1-9.
7. Gan W D, Zhou C, Song B. Network security situation prediction model based on RAN-RBF neural network. Computer Science, 2016, 43(S2): 388-392 (in Chinese)
8. Zhang R C, Zhang Y C, Liu J, et al. Network security situation prediction method using improved convolution neural network. Computer Engineering and Applications, 2019, 55(6): 86-93 (in Chinese)
9. Wang Y H, Gao H, Chen X L. Traffic prediction method using structure varying dynamic Bayesian networks. Journal of Frontiers of Computer Science and Technology, 2017, 11(4): 528-538 (in Chinese)
10. Semero Y K, Zheng D H, Zhang J H. A PSO-ANFIS based hybrid approach for short term PV power prediction in microgrids. Electric Power Components and Systems, 2018, 46(1): 95-103
11. Wu L Y, Wu Z P, Qi Y J. GM (1, 1) model for interval grey number based on genetic algorithm. Control and Decision, 2019, 34(2): 445-448 (in Chinese)
12. Tang M Z, Yang C H, Gui W H. Fault detection based on modified QBC and CS-SVM. Control and Decision, 2012, 27(10): 1489-1493 (in Chinese)
13. Cao Z J, Lin J, Wan C, et al. Optimal cloud computing resource allocation for demand side management in smart grid. IEEE Trans on Smart Grid, 2017, 8(4):1943-1955
14. Liu Y, Cao J J, Diao X C, et al. Multiobjective ant colony optimization for stable feature selection. Journal of National University of Defense Technology, 2018, 40(6): 118-123 (in Chinese)
15. Chao X Q, Li W. Feature selection method optimized by artificial bee colony algorithm. Journal of Frontiers of Computer Science and Technology, 2019, 13(2): 300-309 (in Chinese)
16. Li Y H, Xia J B, Zhang S L, et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 2012, 39(1): 424-430
17. Mirjalili S, Mirjalili S M, Lewis A. Grey wolf optimizer. Advances in Engineering Software, 2014, 69: 46-61
18. Long W, Wu T B. Improved grey wolf optimization algorithm coordinating the ability of exploration and exploitation. Control and Decision, 2017, 32(10): 1749-1757 (in Chinese)
19. Teng Z J, Lü J L, Guo L W, et al. An improved hybrid grey wolf optimization algorithm based on Tent mapping. Journal of Harbin Institute of Technology, 2018, 50(11): 40-49. (in Chinese)
20. Zhao Y P, Zhang H Z. The chaos ant colony optimization algorithm for solving vehicle routing problem with flexible time windows. Mathematical Theory and Applications, 2016, 36(2): 84-92 (in Chinese)
21. Zou X Q, Bao X G, Huang X J, et al. Calculating the feature method of short text based on analytic hierarchy process. Journal on Communications, 2016, 37(12): 50-55 (in Chinese)
|