An approach for improving performance of Web services and cloud based applications
暂无分享,去创建一个
[1] Jinzy Zhu,et al. Cloud Computing Technologies and Applications , 2010, Handbook of Cloud Computing.
[2] Gang Xiao,et al. Real-time environment aware web service selection and evaluation , 2015, 2015 Tenth International Conference on Digital Information Management (ICDIM).
[3] Hala S. Own,et al. Rough set based classification of real world Web services , 2015, Inf. Syst. Frontiers.
[4] Shadi Aljawarneh,et al. Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..
[5] Gugulothu Narsimha,et al. An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function , 2016, J. Univers. Comput. Sci..
[6] Unil Yun,et al. A new efficient approach for mining uncertain frequent patterns using minimum data structure without false positives , 2017, Future Gener. Comput. Syst..
[7] Bassam Al Kasasbeh,et al. An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats , 2016, Int. J. Cloud Appl. Comput..
[8] Gunupudi Rajesh Kumar,et al. Intrusion Detection Using Text Processing Techniques: A Recent Survey , 2015 .
[9] Gunupudi Rajesh Kumar,et al. An improved k-Means Clustering algorithm for Intrusion Detection using Gaussian function , 2015 .
[10] Latifa Ben Arfa Rabai,et al. A Security Framework for Secure Cloud Computing Environments , 2016, Int. J. Cloud Appl. Comput..
[11] Aarti Singh,et al. A novel agent based autonomous and service composition framework for cost optimization of resource provisioning in cloud computing , 2017, J. King Saud Univ. Comput. Inf. Sci..
[12] Gugulothu Narsimha,et al. Intrusion Detection A Text Mining Based Approach , 2016, ArXiv.
[13] M. Sasikumar,et al. Trust Model for Measuring Security Strength of Cloud Computing Service , 2015 .
[14] Shadi Aljawarneh,et al. Cloud Security Engineering: Avoiding Security Threats the Right Way , 2011, Int. J. Cloud Appl. Comput..
[15] Gugulothu Narsimha,et al. A Novel Similarity Measure for Intrusion Detection using Gaussian Function , 2016, ArXiv.
[16] Rajkumar Buyya,et al. Cloud Computing Principles and Paradigms , 2011 .
[17] K. Chandrasekaran,et al. Essentials of Cloud Computing , 2014 .
[18] Shusaku Tsumoto,et al. Similarity-based behavior and process mining of medical practices , 2014, Future Gener. Comput. Syst..
[19] Vangipuram Radhakrishna,et al. A Novel Approach for Mining Similarity Profiled Temporal Association Patterns Using Venn Diagrams , 2015, ArXiv.
[20] Ruchika Asija,et al. Healthcare SaaS Based on a Data Model with Built-In Security and Privacy , 2016, Int. J. Cloud Appl. Comput..
[21] M. Sasikumar,et al. Data Classification for Achieving Security in Cloud Computing , 2015 .
[22] Vangipuram Radhakrishna,et al. An Efficient Approach to find Similar Temporal Association Patterns Performing Only Single Database Scan , 2016 .
[23] Thamer Al-Rousan,et al. Cloud Computing for Global Software Development: Opportunities and Challenges , 2015, Int. J. Cloud Appl. Comput..
[24] Florije Ismaili,et al. Web services research challenges, limitations and opportunities , 2008 .
[25] Suhardi,et al. Performance Measurement of Cloud Computing Services , 2012, CloudCom 2012.
[26] Nada Lavrac,et al. ClowdFlows: Online workflows for distributed big data mining , 2017, Future Gener. Comput. Syst..
[27] Alptekin Küpçü,et al. Research issues for privacy and security of electronic health services , 2017, Future Gener. Comput. Syst..
[28] Vangipuram Radhakrishna,et al. A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection , 2016, J. Univers. Comput. Sci..
[29] Jamal Bentahar,et al. Misbehavior Detection Framework for Community-Based Cloud Computing , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.