Combating Cyber Attacks in Cloud Systems Using Machine Learning
暂无分享,去创建一个
A. B. M. Shawkat Ali | Md. Tanzim Khorshed | Saleh A. Wasimi | Tanzim Khorshed | S. Wasimi | A. B. M. S. Ali
[1] Kamal Dahbur,et al. A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.
[2] Yoav Freund,et al. A Short Introduction to Boosting , 1999 .
[3] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[4] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .
[5] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[6] A. B. M. Shawkat Ali,et al. Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[7] Ajay K. Sharma,et al. Performance Evaluation of Centralized Multicasting Network over ICMP Ping Flood for DDoS , 2012 .
[8] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[9] Miguel Correia,et al. Lucy in the sky without diamonds: Stealing confidential data in the cloud , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[10] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[11] Wanlei Zhou,et al. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..
[12] A. B. M. Shawkat Ali,et al. Trust Issues that Create Threats for Cyber Attacks in Cloud Computing , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[13] Eugenio Oñate,et al. A Variational Formulation for the Multilayer Perceptron , 2006, ICANN.
[14] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[15] Pat Langley,et al. Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.
[16] Ian H. Witten,et al. Generating Accurate Rule Sets Without Global Optimization , 1998, ICML.
[17] J. Ross Quinlan,et al. Simplifying Decision Trees , 1987, Int. J. Man Mach. Stud..
[18] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[19] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[20] A B M Shawkat Ali,et al. Classifying different denial-of-service attacks in cloud computing using rule-based learning , 2012, Secur. Commun. Networks.
[21] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.