Distributed Log System in Cloud Digital Forensics
暂无分享,去创建一个
Chuan-Gang Liu | Jung-Shian Li | I-Hsien Liu | Yi-Chen Chen | Ci-Bin Jiang | Yi-Chen Chen | I. Liu | Chuan-Gang Liu | Jung-Shian Li | Ci-Bin Jiang
[1] Shreyas Sundaram,et al. Topological Conditions for In-Network Stabilization of Dynamical Systems , 2013, IEEE Journal on Selected Areas in Communications.
[2] D. Manjunath,et al. Efficient Flow Allocation Algorithms for In-Network Function Computation , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[3] Zafar Jafarov. Notice of Violation of IEEE Publication PrinciplesArchitecture of an intelligent system for information security management , 2013, 2013 7th International Conference on Application of Information and Communication Technologies.
[4] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[5] J. Uddin,et al. Impact of background utilization and background traffic on the foreground applications in a wide area network , 2012 .
[6] Ruoqing Zhang,et al. An efficient scheme for log integrity check in security monitoring system , 2013 .
[7] Baldev Singh. An Analysis of Cloud Computing Security Issues , 2016 .
[8] Ioannis N. Athanasiadis,et al. Privacy-preserving computation of participatory noise maps in the cloud , 2014, J. Syst. Softw..
[9] Anil Rawat,et al. User and Device Tracking in Private Networks by Correlating Logs: A System for Responsive Forensic Analysis , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[10] Jeffrey D. Case,et al. Simple Network Management Protocol (SNMP) , 1989, RFC.
[11] Panganamala Ramana Kumar,et al. Toward a theory of in-network computation in wireless sensor networks , 2006, IEEE Communications Magazine.
[12] Shaojie Tang,et al. Data gathering in wireless sensor networks through intelligent compressive sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[13] Naruemon Wattanapongsakorn,et al. A centralized management framework of network-based Intrusion Detection and Prevention System , 2013, The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE).
[14] Wei Wang,et al. Notice of RetractionA Campus Network Security Emergency Response Technical System Based on Emergency Log , 2010, 2010 2nd International Conference on E-business and Information System Security.
[15] Moses Moyo,et al. Information security risk management in small-scale organisations: A case study of secondary schools computerised information systems , 2013, 2013 Information Security for South Africa.
[16] Bashar Nuseibeh,et al. Protecting Privacy in the Cloud: Current Practices, Future Directions , 2016, Computer.
[17] William Stallings,et al. SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 , 1999 .
[18] Chi-Tsun Cheng,et al. A Delay-Aware Network Structure for Wireless Sensor Networks With In-Network Data Fusion , 2013, IEEE Sensors Journal.
[19] Gerald Keller. Statistics for Management and Economics: Abbreviated , 2003 .
[20] Amin Vahdat,et al. Evaluating Distributed Systems: Does Background Traffic Matter? , 2008, USENIX Annual Technical Conference.
[21] Indrajit Ray,et al. Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.
[22] Robert Shorten,et al. Adaptive tuning of drop-tail buffers for reducing queueing delays , 2006, IEEE Communications Letters.
[23] A. Behl,et al. An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.
[24] Shrisha Rao,et al. A Mechanism Design Approach to Resource Procurement in Cloud Computing , 2014, IEEE Transactions on Computers.
[25] Xinbing Wang,et al. Energy and latency analysis for in-network computation with compressive sensing in wireless sensor networks , 2012, 2012 Proceedings IEEE INFOCOM.
[26] Jianping Wu,et al. A scalable, Web-based architecture for hierarchical network management , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).