A New Neural Network-Based IDS for Cloud Computing
暂无分享,去创建一个
Priyanka Joshi | Praneet Saurabh | Pradeep Mewada | Ritu Prasad | P. Saurabh | Priyanka Joshi | R. Prasad | Pradeep Mewada
[1] Hoon Jae Lee,et al. An efficient and secured data storage scheme in cloud computing using ECC-based PKI , 2014, 16th International Conference on Advanced Communication Technology.
[2] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[3] Eric Pardede,et al. A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds , 2013, J. Softw..
[4] Bhupendra Verma,et al. An Immunity Inspired Anomaly Detection System: A General Framework , 2012, BIC-TA.
[5] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[6] A. D. Gawande,et al. INTRUSION DETECTION SYSTEM FOR CLOUD COMPUTING , 2012 .
[7] Valentina Casola,et al. The CloudGrid approach: Security analysis and performance evaluation , 2013, Future Gener. Comput. Syst..
[8] Danny Ho,et al. Towards an early software estimation using log-linear regression and a multilayer perceptron model , 2013, J. Syst. Softw..
[9] Bhupendra Verma,et al. An efficient proactive artificial immune system based anomaly detection and prevention system , 2016, Expert Syst. Appl..
[10] E. M. Mohamed,et al. Enhanced data security model for cloud computing , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).
[11] Anjali Sardana,et al. IDS Based Defense for Cloud Based Mobile Infrastructure as a Service , 2012, 2012 IEEE Eighth World Congress on Services.
[12] Ching-Nung Yang,et al. Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[13] R. Vanathi,et al. Comparison of Network Intrusion Detection Systems in cloud computing environment , 2012, 2012 International Conference on Computer Communication and Informatics.
[14] Wentao Liu,et al. Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[15] Jie Xu,et al. A novel intrusion severity analysis approach for Clouds , 2013, Future Gener. Comput. Syst..
[16] Soumya Mathew,et al. Securing Cloud from Attacks based on Intrusion Detection System , 2012 .
[17] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[18] Eystein Mathisen,et al. Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).
[19] Yi Mu,et al. Identity-based data storage in cloud computing , 2013, Future Gener. Comput. Syst..