(Wei Q, Jin H Z, Guo J, et al. Research on complex system based on brittleness[J]. J of Systems Engineering, 2004, 19(3): 326-328.)
[2]
Altyeb Altaher, Sureswaran Ramadass, Bhavani Thuraisingham, et al. On-line anomaly detection based on relative entropy[C]. The 4th IEEE Int Conf on Broadband Network and Multimedia Technology(IC-BNMT). Beijing: IEEE Press, 2011: 33-36.
[3]
Philip C H, Yuen S H, Gray Chan. Scalable real-time monitoring for distributed applications[J]. IEEE Trans on Parallel and Distributed Systems, 2012, 23(12): 2330-2337.?
[4]
Akshay Dabholkar, Abhishek Dubey, Aniruddha Gokhale, et al. Reliable distributed real-time and embedded systems through safe middleware adaptation[C]. The 31st Int Symposium on Reliable Distributed Systems. Irvine: IEEE Computer Society, 2012: 362-371.
Suyan He. A weighted relative entropy method for forecasting demand[C]. 2011 Int Conf on Electric Information and Control Engineering(ICEICE). Wuhan: 2001: 130-133.
[11]
Ahmadi-Javid A. An information-theoretic approach to constructing coherent risk measures[C]. 2011 IEEE Int Symposium on Information Theory Proceedings. St.Petersburg: IEEE Press, 2011: 2125-2127.
[12]
Tommas M Cover, Joy A Thomas. 信息论基础[M]. 北京: 机械工业出版社, 2005: 9-25.
[13]
(Tommas M Cover, Joy A Thomas. Elements of information theory[M]. Beijing: China Machine Press, 2005: 9-25.)
[14]
Zhang Y L, Han Z G, Ren J X. A network anomaly detection method based on relative entropy theory[C]. The 2nd Int Symposium on Electronic Commerce and Security. Nanchang: IEEE Press, 2009: 231-235.
[15]
Mahoney V M. A machine learning approach to detecting attacks by identifying anomalies in network traffic[D]. Melbourne: Florida Instrtute of Technology, 2003: 101-120.