Z. Shan, X. Wang, T. Chiueh, and X. Meng, Safe side effects commitment for OS-level virtualization, Proceedings of the 8th ACM international conference on Autonomic computing, ICAC '11, pp.111-120, 2011.
DOI : 10.1145/1998582.1998601

S. J. Shyu and C. Y. Tsai, Finding the longest common subsequence for multiple biological sequences by ant colony optimization, Computers & Operations Research, vol.36, issue.1, pp.73-91, 2009.
DOI : 10.1016/j.cor.2007.07.006

S. O. Shaughnessy and G. Gray, Development and Evaluation of a Dataset Generator Tool for Generating Synthetic Log Files Containing Computer Attack Signatures, International Journal of Ambient Computing and Intelligence, vol.3, issue.2, pp.64-76, 2011.
DOI : 10.4018/jaci.2011040105

M. O. Mahony, N. Hurley, and G. Silvestre, Promoting recommendations: An attack on collaborative filtering database and expert systems applications, Notes in Computer Science, vol.2453, pp.213-241, 2002.

F. Y. Leu and K. W. Hu, Intrusion detection and identification system using data mining and forensic techniques The Security international conference on Advances in information and computer security, pp.137-152, 2007.

J. Giffin, S. Jha, and B. Miller, Automated Discovery of Mimicry Attacks, The international conference on Recent Advances in Intrusion Detection, pp.41-60, 2006.
DOI : 10.1007/11856214_3

J. Choi, C. Choi, B. Ko, D. Choi, and P. Kim, Detecting web based DDoS attack using MapReduce operations in cloud computing environment, Journal of Internet Services and Information Security, vol.3, issue.4, pp.28-37, 2013.

H. Kang and S. Kim, A new logging-based IP traceback approach using data mining techniques, Journal of Internet Services and Information Security, vol.34, issue.3, pp.72-80, 2013.

R. J. Roger and M. W. Geatz, Data Mining: A tutorial-based primer, 2002.

D. Zhu and J. Xiao, R-tfidf, a Variety of tf-idf Term Weighting Strategy in Document Categorization, 2011 Seventh International Conference on Semantics, Knowledge and Grids, pp.83-90, 2011.
DOI : 10.1109/SKG.2011.44

P. Angin and B. Bhargava, An agent-based optimization framework for mobile-cloud computing, pp.1-17, 2013.

A. P. Ling, S. Kokichi, and M. Masao, Enhancing smart grid system processes via philosophy of Security -case study based on information security systems, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.94-112, 2012.