[1]
G. Zhang and M. Parashar: Cluster Comput., Vol. 13 (2010), pp.67-86.
Google Scholar
[2]
R. J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems , 2nd Edition, John Wiley & Sons, (2008).
Google Scholar
[3]
Information on http: /en. wikipedia. org/wiki/Computer_network_operations.
Google Scholar
[4]
Y. Yang, J. Jiao, H. Wang and C. Xai, in: Proc. of the Int. Conf. Info. Sci. Eng., (2009), pp.1617-1621.
Google Scholar
[5]
S. Hariri, Q.U. Guangzhi, T. Dharmagadda, M. Ramkishore and C. Raghavendra: IEEE Secur. Privacy, Vol. 1 (2003), pp.256-261.
DOI: 10.1109/msecp.2003.1236235
Google Scholar
[6]
X. T. Duan, C. F. Liu and C. B. Liu: Journal on Communications, Vol. 31 (2010), pp.109-114.
Google Scholar
[7]
M. Shehab, N. Mansour and A. Faour, in: Proc. of the Int. Symp. Parall. Archit. Algorithms Networks, (2008), pp.167-172.
Google Scholar
[8]
S. Teng, H. Du, N. Wu, W. Zhang and J. Su: Journal of Networks, Vol. 5 (2010), pp.475-483.
Google Scholar
[9]
F. D. Rango and A. Marano, in Proc. of the ACM Int. Wirel. Commun. Mob. Comput. Conf., (2009), pp.1443-1448.
Google Scholar
[10]
F. Sun, Q. Zheng and T. Li, in: Proc. of the Int. Conf. Bioinformatics Biomed. Eng., Vol. 1 (2008), pp.644-647.
Google Scholar
[11]
T. Li: Sci. in China, Ser. F: Info. Sci., Vol. 51 (2008), pp.1475-1486.
Google Scholar
[12]
R. L. Fanelli: Lecture Notes in Computer Science, Vol. 6209 (2010), pp.264-275.
Google Scholar
[13]
F. Sun and L. Gao, in Proc. of the ETP/IITA Conf. Sys. Sci. Simu. Eng., (2010), pp.62-65.
Google Scholar
[14]
G. R. Zargar and P. Kabiri, in: Proc. of the IEEE Stud. Conf. Res. Dev., (2009), pp.49-52.
Google Scholar
[15]
S. Kumar, M. Azad, O. Gomez and R. Valdez, in: Proc. Adv. Int. Conf. Telecom. Int. Conf. Internet Web Applic. Serv., (2006), p.89.
Google Scholar
[16]
F. Sun, M. Kong and S. Deng, in: Proc. of the Int. Conf. Networks Secur., Wirel. Commun. Trusted Comput., Vol. 1 (2010), pp.74-76.
Google Scholar
[17]
L. N. Castro and J. I. Timmis: Soft Computing, Vol. 7 (2003), pp.526-544.
Google Scholar
[18]
N. Nanas and A. De Roeck: Lecture Notes in Computer Science, Vol. 4628 (2007), pp.13-24.
Google Scholar
[19]
F. Sun and Z. Wu, in: Proc. of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., (2009), pp.119-121.
Google Scholar
[20]
F. Sun and F. Xu, in: Proc. of the Int. Conf. Bioinformatics Biomed. Eng., Vol. 1 (2009), pp.1-4.
Google Scholar
[21]
F. Sun and S. Zhang, in: Proc. of the Int. Conf. Web Inf. Syst. Min., (2009), pp.515-518.
Google Scholar
[22]
F. Sun, X. Han and J. Wang, in: Proc. of the Int. Conf. Chall. Environ. Sci. Comput. Eng., Vol. 2 (2010), pp.33-35.
Google Scholar
[23]
P. Matzinger: Science, Vol. 12 (2002), pp.301-305.
Google Scholar
[24]
F. Sun, M. Kong and J. Wang, in: Proc. of the Int. Conf. MultiMedia Info. Technol., Vol. 2 (2010), pp.93-95.
Google Scholar
[25]
F. Sun, in: Proc. of the Int. Conf. E-learn., E-Bus., Enterp. Inf. Syst., E-Gov., Vol. 2 (2010), pp.145-148.
Google Scholar
[26]
F. Sun: submitted to Journal of Advanced Materials Research (2010).
Google Scholar