S. Wenchao, W. Ye, H. Yong, and L. Zengshou, Simulation of cloud intrusion detection model in cloud computing network under large data environment

, West China Science and Technology, issue.08, pp.86-88, 2015.

L. Chuang, S. Wenbo, M. Kun, L. Qu, and L. Weidong, Cloud computing security: architecture, mechanism and model evaluation, J]. Journal of Computer Science, issue.09, pp.1765-1784, 2013.

G. Xu-yingying, S. Fei, Z. Fengying, and . Junli, New Cloud Security Solution and Its Key Technology

J. Yimu, K. Jiabang, P. Qiaoyu, and K. Zizhuo, A cloud computing security model and architecture design research, pp.6-8, 2012.

, Gong Chengqing. Based on artificial intelligence network intrusion detection system design

, Journal of Nanning Vocational and Technical College, vol.05, pp.98-100, 2009.

Y. Yuan, Artificial Intelligence and Network Security

, Neijiang Technology, vol.12, pp.103-172, 2009.

X. Tao, H. Huaiwen, and L. Ruishi, Desktop cloud in the university computer laboratory application

, Laboratory Science, issue.01, pp.82-84, 2015.

Z. Ning-xiangyan and . Shunyi, Network security status and technology development

B. Vinothkumar-muthurajan, X. Narayanasamy, and . Huang, An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment, vol.05, pp.49-58, 2012.

, The Scientific WorldJ ournal, pp.1-8, 2016.

. Xue-haiwei, . Zhang-yunliang, . Guo-zhien, and Y. Dai, A Multilevel Security Model for Private Cloud

, Chinese Journal of Electronics, vol.02, pp.232-235, 2014.

, Chinese Journal of Electronics, issue.02, pp.232-235, 2014.

H. Dongxing, Based on artificial intelligence information network security situational awareness technology, vol.06, pp.80-81, 2012.

C. Mei-fang, Study on key technology of network security management based on artificial intelligence theory

, Computer CD-ROM Software and Application, vol.23, pp.95-108, 2012.

G. Zhan, Design and Implementation of Campus Network Security Management System in Grid Environment, J

H. Wenhua and C. Zhigang, Network security status analysis and development trend

, Communication Technology, vol.10, pp.30-33, 2007.

D. Basak, R. Toshniwal, S. Maskalik, and A. Sequeira, Virtualizing networking and security in the cloud

, ACM SIGOPS Operating Systems Review, vol.44, issue.4, 2010.

, ACM SIGOPS Operating Systems Review, vol.4, issue.44, pp.86-94, 2010.

Y. Chang, Z. Zhang, and J. Wang, A Security Protocol for Trusted Access to Cloud Environment, Recent Advances in Electrical & Electronic Engineering, vol.8, pp.1-1, 2015.

W. Tianming and L. Shulin, Cloud desktop technology in the construction of educational information

, Computer CD-ROM Software and Application, issue.02, pp.228-230, 2015.

. Wu-yuanyuan, Cloud desktop technology in the computer room management application

P. Miao, Ant colony optimization algorithm in cloud computing resource allocation on the application

H. Xiangyu, Design and Implementation of Cloud Desktop Management Platform Based on Virtualization

. Addis, . Bernardetta, . Ardagna, . Danilo, . Panicucci et al., A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms, IEEE Transactions on Dependable and Secure Computing, vol.10, 2013.

, IEEE Transactions on Dependable and Secure Computing, issue.10, pp.253-272, 2013.

J. Zhang, Z. Xu, and Y. Li, An Optimal Resource Allocation Method for Aircraft Subassembly System Based on Graphic Ant Colony Algorithm

, Advanced Materials Research, issue.156, p.1035, 2011.

, Advanced Materials Research, vol.156, pp.1397-1403, 1035.

H. Li, L. P. Wang, G. Li, and Z. Liu, The Industry Management System Based on Virtualization and Cloud Computing

, Advanced Materials Research, issue.488, p.1693, 2012.

, Advanced Materials Research, vol.488, pp.782-786, 1693.

Y. Tao and L. Dan, Virtual cloud desktop technology research and implementation, J]. Journal of Chengdu University (Natural Science Edition), issue.02, pp.145-147, 2013.

P. Fu, Cloud computing security model and management

, Electronic Technology and Software Engineering, issue.16, pp.250-251, 2013.

Z. Jiang, On cloud computing security model and management, Electronic Technology and Software Engineering, p.253, 2013.

. Hua-xiahan, H. Chung-joon, and . Wenxin, Ant colony optimization based on cloud computing environment resource allocation algorithm, Journal of east China normal university, pp.127-134

W. Huang-jun, W. Qingfeng-zhi-qin-liu, and . Yaobin, Ant colony algorithm is based on resource state of cloud computing task allocation, Computer engineering and design, issue.9, pp.3305-3309, 2014.

S. P. Liu, Research on Cloud Computing Strategy Based on Security Model, J].Applied Mechanics and Materials, vol.3468, issue.644, 2014.

, Applied Mechanics and Materials, vol.644, issue.3468, pp.1835-1839, 2014.

Z. Gan-sen, Chun ming Rong, MartinGiljeJaatun, FrodeEikaSandnes.Reference deployment models for eliminating user concerns on cloud security

, The Journal of Super computing, vol.61, issue.2, pp.337-352, 2012.

. Liendeboosere, . Bertvankeirsbilck, . Pietersimoens, . Filipturck, . Bartdhoedt et al., Efficient resource management for virtual desktop cloud computing

, The Journal of Superc omputing, vol.62, issue.2, pp.741-767, 2012.

. Jiang-fan-jun, Cloud desktop technology in the application of the computer teaching management in colleges and universities, Donghua university, 2016.

N. Wang-rui, Cloud desktop platform based on virtual technology in the teaching the application, pp.56-60, 2016.

H. Wu-jia, Analyze the cloud desktop technology application in university training rooms management, Journal of electronic technology and software engineering, p.178, 2016.

W. Yong and W. C. Yang, A desktop cloud build campus network office platform based on the application study, Journal of network security technology and applications, pp.103-104, 2016.