IDS: Survey on Intrusion Detection System in Cloud Computing
暂无分享,去创建一个
[1] Peter Mell,et al. Intrusion Detection Systems , 2001 .
[2] Irfan Gul,et al. Distributed Cloud Intrusion Detection Model , 2011 .
[3] Mukesh Singhal,et al. Information flow control in cloud computing , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[4] Manas Ranjan Patra,et al. A Service Oriented Architectural Design for Building Intrusion Detection Systems , 2009 .
[5] Pritesh Jain,et al. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.
[6] Sugata Sanyal,et al. A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.
[7] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[8] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[9] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[10] Harley Kozushko,et al. Intrusion Detection : Host-Based and Network-Based Intrusion Detection Systems , 2003 .
[11] Zaigham Mahmood. Cloud Computing: Characteristics and Deployment Approaches , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.
[12] Urjita Thakar,et al. HoneyAnalyzer – Analysis and Extraction of Intrusion Detection Patterns & Signatures Using Honeypot , 2005 .
[13] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[14] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[15] Peter Mell,et al. NIST Special Publication on Intrusion Detection Systems , 2001 .