162
Views
2
CrossRef citations to date
0
Altmetric
Articles

Research on reliability analysis of computer network based on intelligent cloud computing method

Pages 283-288 | Received 29 Aug 2017, Accepted 06 Nov 2017, Published online: 01 Dec 2017

References

  • Moon D , Kim I , Joo JW , et al . Intelligent security model of smart phone based on human behavior in mobile cloud computing[J]. Wireless Pers Commun. 2016;94(4):1–14.
  • Zhao J , Ding W , Zhan L, et al . Wide‐area smart grids with new smart units synchronized measurement analysis and control based on cloud computing platform[J]. Int. J. Energy Res. 2016;40(3):362-378.
  • Yang HS , Yoo SJ . A study on smartwork security technology based on cloud computing environment[J]. Wireless Pers Commun. 2015;94(3):1–10.10.1007/s11277-015-2874-4
  • Yigit M , Gungor VC , Baktir S . Cloud computing for smart grid applications[J]. Comput Netw. 2014;70(70):312–329.10.1016/j.comnet.2014.06.007
  • Liu Y , Liu W , Song J , et al . An empirical study on implementing highly reliable stream computing systems with private cloud[J]. Ad Hoc Netw. 2015;35(C):37–50.10.1016/j.adhoc.2015.07.009
  • Lin H , Xu L , Mu Y , et al . A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing[J]. Future Gener Comput Syst. 2014;52(C):125–136.
  • Zhu C , Sheng Z , Leung VCM , et al . Toward offering more useful data reliably to mobile cloud from wireless sensor network[J]. IEEE Trans Emerging Top Comput. 2015;3(1):84–94.10.1109/TETC.2014.2364921
  • Stantchev V , Prieto-González L , Tamm G . Cloud computing service for knowledge assessment and studies recommendation in crowdsourcing and collaborative learning environments based on social network analysis[J]. Comput Human Behav. 2015;51:762–770.10.1016/j.chb.2014.11.092
  • Chen J , Zhao H , Yang J , et al . An intelligent character recognition method to filter spam images on cloud[J]. Soft Comput. 2015;1–11.
  • Gupta S , Kumar P . An immediate system call sequence based approach for detecting malicious program executions in cloud environment[J]. Wireless Pers Commun. 2015;81(1):1–21.
  • Ma YW , Cho WT , Chen JL , et al . RFID-based mobility for seamless personal communication system in cloud computing[J]. Telecommun Syst. 2015;58(3):1–9.
  • Muhammad G . Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system[J]. Cluster Comput. 2015;18(2):1–8.
  • Zhang DG , Zheng K , Zhang T , et al . A novel multicast routing method with minimum transmission for WSN of cloud computing service[J]. Soft Comput. 2015;19(7):1817–1827.10.1007/s00500-014-1366-x
  • Qi L , Dou W , Chen J . Weighted principal component analysis-based service selection method for multimedia services in cloud[J]. Computing. 2016:98(1–2):195–214.
  • Chang YS , Fan CT , Lo WT , et al . Mobile cloud-based depression diagnosis using an ontology and a Bayesian network[J]. Future Gener Comput Syst. 2015;s 43–44:87–98.10.1016/j.future.2014.05.004
  • Baek J , Vu QH , Liu JK , et al . A secure cloud computing based framework for big data information management of smart grid[J]. IEEE Trans Cloud Comput. 2015;3(2):233–244.10.1109/TCC.2014.2359460
  • Lin HY , Hsieh MY , Li KC . Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments[J]. Telecommun Syst. 2015;60(2):1–11.
  • Liu X , Yang W , Shen Z . H.264/AVC video error concealment algorithm by employing motion vector recovery under cloud computing environment[J]. J Supercomput. 2014;70(3):1180–1199.10.1007/s11227-014-1167-0
  • Choi C , Choi J , Kim P . Ontology-based access control model for security policy reasoning in cloud computing[J]. J Supercomput. 2014;67(3):711–722.10.1007/s11227-013-0980-1
  • Latif R , Abbas H , Assar S , et al . Cloud computing risk assessment: a systematic literature review[J]. Lect Notes Electr Eng. 2014;276:285–295.10.1007/978-3-642-40861-8

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.