3Jensen M,Schwenk J, Gruschka N, et al. On Technical Security Issues in Cloud Computing[C]//2009. IEEE International Con ference on Cloud Computing. Sept. 2009:109-116.
4Leu Fang-Yie, Lin Jia-Chun, et al. A performance-based grid in trusion detection system[C]//29th Annual International Computer Software and Applications Conference(COMPSAC 2005). Volume 1,July 2005:525-530.
5Schulter A,Vieira K,Westphall C, et al. Intrusion Detection for Computational Grids[C]// New Technologies, Mobility and Security(NTMS'08). Nov. 2008:1-5.
6Li Yuan-Cheng,Wang Zhong-Qiang. Wavelet Analysis and Pat tern Recognition[C]//ICWAPR'07. Volume 4, Nov. 2007: 1462-1466.
7Li Jun, Hao Pengwei. Hierarchical Structuring of Data on Manifolds[C]//IEEE Conference on Computer Vision and Pattern Recognition(CVPR '07). June 2007 : 1-8.
8Foster I, Zbao Yong, Raieu I, et al. Cloud Computing and Grid Computing 360-Degree Compared [C]//Grid Computing Environments Workshop(GCE '08). Nov. 2008:1-10.
9Roweis S, Saul L. Nonlinear dimensionality reduction by locally linear embedding[J]. Science, 2000,290 : 2323-2326.
10KDD Cup 1999 Data. Information and Computer Science[EB/ OL]. http://kdd. ics. uci. edu/database/kddcup99/kddcup99. html.