-
1
-
-
79951578112
-
Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
-
M.S. Abadeh, H. Mohamadi, and J. Habibi Design and analysis of genetic fuzzy systems for intrusion detection in computer networks Expert Systems with Applications 38 6 2011 7067 7075
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.6
, pp. 7067-7075
-
-
Abadeh, M.S.1
Mohamadi, H.2
Habibi, J.3
-
4
-
-
79151484606
-
Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset
-
V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset Expert Systems with Applications 38 5 2011 5947 5957
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.5
, pp. 5947-5957
-
-
Bolón-Canedo, V.1
Sánchez-Maroño, N.2
Alonso-Betanzos, A.3
-
7
-
-
80755133532
-
Voting based extreme learning machine
-
J. Cao, Z. Lin, G.B. Huang, and N. Liu Voting based extreme learning machine Information Sciences 185 1 2012 66 77
-
(2012)
Information Sciences
, vol.185
, Issue.1
, pp. 66-77
-
-
Cao, J.1
Lin, Z.2
Huang, G.B.3
Liu, N.4
-
8
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
(accessed October 2013)
-
C.C. Chang, and C.J. Lin LIBSVM: A library for support vector machines ACM Transactions on Intelligent Systems and Technology (TIST) 2 3 2011 27 < http://www.csie.ntu.edu.tw/~cjlin/libsvm > (accessed October 2013)
-
(2011)
ACM Transactions on Intelligent Systems and Technology (TIST)
, vol.2
, Issue.3
, pp. 27
-
-
Chang, C.C.1
Lin, C.J.2
-
10
-
-
84899721363
-
Efficient classification using parallel and scalable compressed model and its application on intrusion detection
-
T. Chen, X. Zhang, S. Jin, and O. Kim Efficient classification using parallel and scalable compressed model and its application on intrusion detection Expert Systems with Applications 41 13 2014 5972 5983
-
(2014)
Expert Systems with Applications
, vol.41
, Issue.13
, pp. 5972-5983
-
-
Chen, T.1
Zhang, X.2
Jin, S.3
Kim, O.4
-
12
-
-
84893662789
-
Review and performance comparison of SVM-and ELM-based classifiers
-
J. Chorowski, J. Wang, and J.M. Zurada Review and performance comparison of SVM-and ELM-based classifiers Neurocomputing 128 2014 507 516
-
(2014)
Neurocomputing
, vol.128
, pp. 507-516
-
-
Chorowski, J.1
Wang, J.2
Zurada, J.M.3
-
13
-
-
74849089286
-
Ensemble of machine learning algorithms for intrusion detection
-
SMC 2009 IEEE
-
T.-S. Chou, J. Fan, S. Fan, and K. Makki Ensemble of machine learning algorithms for intrusion detection IEEE International conference on systems, man and cybernetics, 2009 SMC 2009 2009 IEEE 3976 3980
-
(2009)
IEEE International Conference on Systems, Man and Cybernetics, 2009
, pp. 3976-3980
-
-
Chou, T.-S.1
Fan, J.2
Fan, S.3
Makki, K.4
-
14
-
-
84897137099
-
A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
-
G. Creech, and J. Hu A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns IEEE Transactions on Computers 63 4 2013 513 529
-
(2013)
IEEE Transactions on Computers
, vol.63
, Issue.4
, pp. 513-529
-
-
Creech, G.1
Hu, J.2
-
20
-
-
0003893616
-
Requirements and model for IDES - A real-time intrusion detection expert system
-
Document A005
-
Denning, D. E.; Neumann, P. G. (1985). Requirements and model for IDES - A real-time intrusion detection expert system. Document A005, SRI International, p. 333.
-
(1985)
SRI International
, pp. 333
-
-
Denning D. ., E.1
Neumann P. ., G.2
-
21
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Systems with Applications 29 4 2005 713 722
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
23
-
-
84880499506
-
A novel extreme learning machine based on hybrid kernel function
-
S. Ding, Y. Zhang, X. Xu, and L. Bao A novel extreme learning machine based on hybrid kernel function Journal of Computers 8 8 2013 2110 2117
-
(2013)
Journal of Computers
, vol.8
, Issue.8
, pp. 2110-2117
-
-
Ding, S.1
Zhang, Y.2
Xu, X.3
Bao, L.4
-
24
-
-
84929521587
-
Extreme learning machine: Algorithm, theory and applications
-
S. Ding, H. Zhao, Y. Zhang, X. Xu, and R. Nie Extreme learning machine: Algorithm, theory and applications Artificial Intelligence Review 2013 1 13
-
(2013)
Artificial Intelligence Review
, pp. 1-13
-
-
Ding, S.1
Zhao, H.2
Zhang, Y.3
Xu, X.4
Nie, R.5
-
25
-
-
84906542953
-
On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems
-
S. Elhag, A. Fernández, A. Bawakid, S. Alshomrani, and F. Herrera On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems Expert Systems with Applications 42 1 2015 193 202
-
(2015)
Expert Systems with Applications
, vol.42
, Issue.1
, pp. 193-202
-
-
Elhag, S.1
Fernández, A.2
Bawakid, A.3
Alshomrani, S.4
Herrera, F.5
-
26
-
-
79953303626
-
Exploring discrepancies in findings obtained with the KDD Cup'99 data set
-
V. Engen, J. Vincent, and K. Phalp Exploring discrepancies in findings obtained with the KDD Cup'99 data set Intelligent Data Analysis 15 2 2011 251 276
-
(2011)
Intelligent Data Analysis
, vol.15
, Issue.2
, pp. 251-276
-
-
Engen, V.1
Vincent, J.2
Phalp, K.3
-
28
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Y. Freund, and R.E. Schapire A decision-theoretic generalization of on-line learning and an application to boosting Journal of Computer and System Sciences 55 1 1997 119 139
-
(1997)
Journal of Computer and System Sciences
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
34
-
-
84961369835
-
-
UCI KDD archive. < > (accessed May 2013)
-
Hettich, S.; Bay, S. D. (2013). KDD Cup dataset (1999): UCI KDD archive. < http://kdd.ics.uci.edu//databases/kddcup99/kddcup99.html > (accessed May 2013).
-
(2013)
KDD Cup Dataset
-
-
Hettich, S.1
Bay, S.D.2
-
35
-
-
84942484786
-
Ridge regression: Biased estimation for nonorthogonal problems
-
A.E. Hoerl, and R.W. Kennard Ridge regression: Biased estimation for nonorthogonal problems Technometrics 12 1 1970 55 67
-
(1970)
Technometrics
, vol.12
, Issue.1
, pp. 55-67
-
-
Hoerl, A.E.1
Kennard, R.W.2
-
36
-
-
84961371027
-
-
(accessed February 2013)
-
Hoi, Steven C. H. (2013). MKBoost matlab source code. < http://www.cais.ntu.edu.sg/~chhoi/mkboost/code/MKBoost.zip > (accessed February 2013).
-
(2013)
MKBoost Matlab Source Code
-
-
Hoi Steven, C.H.1
-
37
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
S.J. Horng, M.Y. Su, Y.H. Chen, T.W. Kao, R.J. Chen, and J.L. Lai A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Systems with Applications 38 1 2011 306 313
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.1
, pp. 306-313
-
-
Horng, S.J.1
Su, M.Y.2
Chen, Y.H.3
Kao, T.W.4
Chen, R.J.5
Lai, J.L.6
-
39
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
C.W. Hsu, and C.J. Lin A comparison of methods for multiclass support vector machines IEEE Transactions on Neural Networks 13 2 2002 415 425
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, Issue.2
, pp. 415-425
-
-
Hsu, C.W.1
Lin, C.J.2
-
40
-
-
84891062279
-
Online adaboost-based parameterized methods for dynamic distributed network intrusion detection
-
W. Hu, J. Gao, Y. Wang, O. Wu, and S. Maybank Online adaboost-based parameterized methods for dynamic distributed network intrusion detection IEEE Transactions on Systems, Man, and Cybernetics, Part B 44 1 2014 66 82
-
(2014)
IEEE Transactions on Systems, Man, and Cybernetics, Part B
, vol.44
, Issue.1
, pp. 66-82
-
-
Hu, W.1
Gao, J.2
Wang, Y.3
Wu, O.4
Maybank, S.5
-
41
-
-
41749107387
-
AdaBoost-based algorithm for network intrusion detection
-
W. Hu, W. Hu, and S. Maybank AdaBoost-based algorithm for network intrusion detection IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 38 2 2008 577 583
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.38
, Issue.2
, pp. 577-583
-
-
Hu, W.1
Hu, W.2
Maybank, S.3
-
42
-
-
84961302112
-
-
A tutorial in IJCNN2012/WCCI2012, Brisbane, Australia. < > (accessed on July 15, 2013)
-
Huang, G. B. (2012, June). Extreme learning machine: learning without iterative tuning. A tutorial in IJCNN2012/WCCI2012, Brisbane, Australia. < http://www.ntu.edu.sg/home/egbhuang/pdf/ELM-WCCI2012.pdf > (accessed on July 15, 2013).
-
(2012)
Extreme Learning Machine: Learning Without Iterative Tuning
-
-
Huang, G.B.1
-
43
-
-
84906948723
-
An insight into extreme learning machines: Random neurons, random features and kernels
-
G.B. Huang An insight into extreme learning machines: Random neurons, random features and kernels Cognitive Computation 2014 1 15
-
(2014)
Cognitive Computation
, pp. 1-15
-
-
Huang, G.B.1
-
45
-
-
0034187311
-
Classification ability of single hidden layer feedforward neural networks
-
G.B. Huang, Y.Q. Chen, and H.A. Babri Classification ability of single hidden layer feedforward neural networks IEEE Transactions on Neural Networks 11 3 2000 799 801
-
(2000)
IEEE Transactions on Neural Networks
, vol.11
, Issue.3
, pp. 799-801
-
-
Huang, G.B.1
Chen, Y.Q.2
Babri, H.A.3
-
46
-
-
33745918399
-
Universal approximation using incremental constructive feedforward networks with random hidden nodes
-
G.B. Huang, L. Chen, and C.K. Siew Universal approximation using incremental constructive feedforward networks with random hidden nodes IEEE Transactions on Neural Networks 17 4 2006 879 892
-
(2006)
IEEE Transactions on Neural Networks
, vol.17
, Issue.4
, pp. 879-892
-
-
Huang, G.B.1
Chen, L.2
Siew, C.K.3
-
47
-
-
84886513922
-
Liver tumor detection and segmentation using kernel-based extreme learning machine
-
IEEE
-
W. Huang, N. Li, Z. Lin, G.B. Huang, W. Zong, and J. Zhou Liver tumor detection and segmentation using kernel-based extreme learning machine 35th annual international conference of the IEEE Engineering in medicine and biology society (EMBC) 2013, July IEEE 3662 3665
-
(2013)
35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
, pp. 3662-3665
-
-
Huang, W.1
Li, N.2
Lin, Z.3
Huang, G.B.4
Zong, W.5
Zhou, J.6
-
49
-
-
84859007933
-
Extreme learning machine for regression and multiclass classification
-
G.B. Huang, H. Zhou, X. Ding, and R. Zhang Extreme learning machine for regression and multiclass classification IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 42 2 2012 513 529
-
(2012)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.42
, Issue.2
, pp. 513-529
-
-
Huang, G.B.1
Zhou, H.2
Ding, X.3
Zhang, R.4
-
50
-
-
10944272650
-
Extreme learning machine: A new learning scheme of feedforward neural networks
-
IEEE
-
G.B. Huang, Q.Y. Zhu, and C.K. Siew Extreme learning machine: A new learning scheme of feedforward neural networks 2004 ieee international joint conference on neural networks, 2004. Proceedings 2 2004, July IEEE 985 990
-
(2004)
2004 Ieee International Joint Conference on Neural Networks, 2004. Proceedings
, vol.2
, pp. 985-990
-
-
Huang, G.B.1
Zhu, Q.Y.2
Siew, C.K.3
-
53
-
-
84922208776
-
Kernelized extreme learning machine with Levenberg-Marquardt learning approach towards intrusion detection
-
V. Jaiganesh, and P. Sumathi Kernelized extreme learning machine with Levenberg-Marquardt learning approach towards intrusion detection International Journal of Computer Applications 54 14 2012 38 44
-
(2012)
International Journal of Computer Applications
, vol.54
, Issue.14
, pp. 38-44
-
-
Jaiganesh, V.1
Sumathi, P.2
-
54
-
-
82255175861
-
A differentiated one-class classification method with applications to intrusion detection
-
I. Kang, M.K. Jeong, and D. Kong A differentiated one-class classification method with applications to intrusion detection Expert Systems with Applications 39 4 2012 3899 3905
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.4
, pp. 3899-3905
-
-
Kang, I.1
Jeong, M.K.2
Kong, D.3
-
55
-
-
84961382638
-
-
(accessed January 2014)
-
KDD Website (2014). < http://www.kdd.org/kddcup/index.php > (accessed January 2014).
-
(2014)
KDD Website
-
-
-
57
-
-
84865209539
-
A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
-
L. Koc, T.A. Mazzuchi, and S. Sarkani A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier Expert Systems with Applications 39 18 2012 13492 13500
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.18
, pp. 13492-13500
-
-
Koc, L.1
Mazzuchi, T.A.2
Sarkani, S.3
-
58
-
-
80052025073
-
Self-adaptive and dynamic clustering for online anomaly detection
-
S. Lee, G. Kim, and S. Kim Self-adaptive and dynamic clustering for online anomaly detection Expert Systems with Applications 38 12 2011 14891 14898
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.12
, pp. 14891-14898
-
-
Lee, S.1
Kim, G.2
Kim, S.3
-
59
-
-
37249038011
-
Kernel combination versus classifier combination
-
Springer Berlin Heidelberg
-
W.J. Lee, S. Verzakov, and R.P. Duin Kernel combination versus classifier combination Multiple classifier systems 2007 Springer Berlin Heidelberg 22 31
-
(2007)
Multiple Classifier Systems
, pp. 22-31
-
-
Lee, W.J.1
Verzakov, S.2
Duin, R.P.3
-
60
-
-
81855197007
-
An efficient intrusion detection system based on support vector machines and gradually feature removal method
-
Y. Li, J. Xia, S. Zhang, J. Yan, X. Ai, and K. Dai An efficient intrusion detection system based on support vector machines and gradually feature removal method Expert Systems with Applications 39 1 2012 424 430
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.1
, pp. 424-430
-
-
Li, Y.1
Xia, J.2
Zhang, S.3
Yan, J.4
Ai, X.5
Dai, K.6
-
61
-
-
3042674061
-
Gabor-based kernel PCA with fractional power polynomial models for face recognition
-
C. Liu Gabor-based kernel PCA with fractional power polynomial models for face recognition IEEE Transactions on Pattern Analysis and Machine Intelligence 26 5 2004 572 581
-
(2004)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.26
, Issue.5
, pp. 572-581
-
-
Liu, C.1
-
62
-
-
84863876822
-
A comparative analysis of support vector machines and extreme learning machines
-
X. Liu, C. Gao, and P. Li A comparative analysis of support vector machines and extreme learning machines Neural Networks 33 2012 58 66
-
(2012)
Neural Networks
, vol.33
, pp. 58-66
-
-
Liu, X.1
Gao, C.2
Li, P.3
-
63
-
-
26944498248
-
Comparison of extreme learning machine with support vector machine for text classification
-
Y. Liu, H.T. Loh, and S.B. Tor Comparison of extreme learning machine with support vector machine for text classification Innovations in Applied Artificial Intelligence 2005 390 399
-
(2005)
Innovations in Applied Artificial Intelligence
, pp. 390-399
-
-
Liu, Y.1
Loh, H.T.2
Tor, S.B.3
-
65
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory ACM Transactions on Information and System Security 3 4 2000 262 294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
66
-
-
81355151606
-
Random effects logistic regression model for anomaly detection
-
M.S. Mok, S.Y. Sohn, and Y.H. Ju Random effects logistic regression model for anomaly detection Expert Systems with Applications 37 10 2010 7162 7166
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.10
, pp. 7162-7166
-
-
Mok, M.S.1
Sohn, S.Y.2
Ju, Y.H.3
-
71
-
-
84876503003
-
Robust multiclass classification for learning from imbalanced biomedical data
-
P. Phoungphol, Y. Zhang, and Y. Zhao Robust multiclass classification for learning from imbalanced biomedical data Tsinghua Science and Technology 17 6 2012 619 628
-
(2012)
Tsinghua Science and Technology
, vol.17
, Issue.6
, pp. 619-628
-
-
Phoungphol, P.1
Zhang, Y.2
Zhao, Y.3
-
72
-
-
33748611921
-
Ensemble based systems in decision making
-
R. Polikar Ensemble based systems in decision making IEEE Circuits and Systems Magazine 6 3 2006 21 45
-
(2006)
IEEE Circuits and Systems Magazine
, vol.6
, Issue.3
, pp. 21-45
-
-
Polikar, R.1
-
73
-
-
84864758525
-
Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation
-
D.M. Powers Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation Journal of Machine Learning Technologies 2 1 2011 37 63
-
(2011)
Journal of Machine Learning Technologies
, vol.2
, Issue.1
, pp. 37-63
-
-
Powers, D.M.1
-
74
-
-
84896401783
-
A short note about the application of polynomial kernels with fractional degree in Support Vector Learning
-
Springer Berlin Heidelberg
-
R. Rossius, G. Zenker, A. Ittner, and W. Dilger A short note about the application of polynomial kernels with fractional degree in Support Vector Learning Machine Learning: ECML-98 1998 Springer Berlin Heidelberg 143 148
-
(1998)
Machine Learning: ECML-98
, pp. 143-148
-
-
Rossius, R.1
Zenker, G.2
Ittner, A.3
Dilger, W.4
-
76
-
-
0025448521
-
The strength of weak learnability
-
R.E. Schapire The strength of weak learnability Machine Learning 5 2 1990 197 227
-
(1990)
Machine Learning
, vol.5
, Issue.2
, pp. 197-227
-
-
Schapire, R.E.1
-
78
-
-
81855221688
-
Decision tree based light weight intrusion detection using a wrapper approach
-
S.S.S. Sindhu, S. Geetha, and A. Kannan Decision tree based light weight intrusion detection using a wrapper approach Expert Systems with Applications 39 1 2012 129 141
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.1
, pp. 129-141
-
-
Sindhu, S.S.S.1
Geetha, S.2
Kannan, A.3
-
79
-
-
65649138430
-
A systematic analysis of performance measures for classification tasks
-
M. Sokolova, and G. Lapalme A systematic analysis of performance measures for classification tasks Information Processing and Management 45 4 2009 427 437
-
(2009)
Information Processing and Management
, vol.45
, Issue.4
, pp. 427-437
-
-
Sokolova, M.1
Lapalme, G.2
-
80
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
IEEE
-
R. Sommer, and V. Paxson Outside the closed world: On using machine learning for network intrusion detection 2010 IEEE symposium on security and privacy (SP) 2010, May IEEE 305 316
-
(2010)
2010 IEEE Symposium on Security and Privacy (SP)
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
83
-
-
34547673383
-
Cost-sensitive boosting for classification of imbalanced data
-
Y. Sun, M.S. Kamel, A.K. Wong, and Y. Wang Cost-sensitive boosting for classification of imbalanced data Pattern Recognition 40 12 2007 3358 3378
-
(2007)
Pattern Recognition
, vol.40
, Issue.12
, pp. 3358-3378
-
-
Sun, Y.1
Kamel, M.S.2
Wong, A.K.3
Wang, Y.4
-
84
-
-
84896399398
-
Extension of a kernel-based classifier for discriminative spoken keyword spotting
-
S. Tabibian, A. Akbari, and B. Nasersharif Extension of a kernel-based classifier for discriminative spoken keyword spotting Neural Processing Letters 39 2 2014 195 218
-
(2014)
Neural Processing Letters
, vol.39
, Issue.2
, pp. 195-218
-
-
Tabibian, S.1
Akbari, A.2
Nasersharif, B.3
-
86
-
-
84941079784
-
A new approach to intrusion detection using artificial neural networks and fuzzy clustering
-
G. Wang, J. Hao, J. Ma, and L. Huang A new approach to intrusion detection using artificial neural networks and fuzzy clustering Expert Systems with Applications 37 9 2010 6225 6232
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.9
, pp. 6225-6232
-
-
Wang, G.1
Hao, J.2
Ma, J.3
Huang, L.4
-
87
-
-
33745926790
-
Comparative study of extreme learning machine and support vector machine
-
Springer Berlin Heidelberg
-
X.K. Wei, Y.H. Li, and Y. Feng Comparative study of extreme learning machine and support vector machine Advances in neural networks-ISNN 2006 2006 Springer Berlin Heidelberg 1089 1095
-
(2006)
Advances in Neural Networks-ISNN 2006
, pp. 1089-1095
-
-
Wei, X.K.1
Li, Y.H.2
Feng, Y.3
-
90
-
-
37749036828
-
Adaptive intrusion detection based on machine learning: Feature extraction, classifier construction and sequential pattern prediction
-
X. Xu Adaptive intrusion detection based on machine learning: Feature extraction, classifier construction and sequential pattern prediction International Journal of Web Services Practices 2 1-2 2006 49 58
-
(2006)
International Journal of Web Services Practices
, vol.2
, Issue.12
, pp. 49-58
-
-
Xu, X.1
|