Efficient approaches for intrusion detection in cloud environment
暂无分享,去创建一个
Vijay Varadharajan | Emmanuel S. Pilli | Udaya Tupakula | Preeti Mishra | E. Pilli | V. Varadharajan | U. Tupakula | P. Mishra
[1] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[2] Jin Tong,et al. NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292) , 2012 .
[3] Min-Woo Park,et al. Multi-level Intrusion Detection System and log management in Cloud Computing , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[4] Wenjuan Li,et al. Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[5] M. F. Augusteijn,et al. Neural network classification and novelty detection , 2002 .
[6] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[7] Chih-Hung Lin,et al. Efficient and effective NIDS for cloud virtualization environment , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[8] Vijay Varadharajan,et al. Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.
[9] Muttukrishnan Rajarajan,et al. A novel framework for intrusion detection in cloud , 2012, SIN '12.
[10] Christoph Meinel,et al. Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[11] Errin W. Fulp,et al. Distributed Data Parallel Techniques for Content-Matching Intrusion Detection Systems , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[12] Te-Shun Chou,et al. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .
[13] M. Cajkovsky,et al. A distributed network intrusion detection system architecture based on computer stations using GPGPU , 2013, 2013 IEEE 17th International Conference on Intelligent Engineering Systems (INES).
[14] Yacine Bouzida,et al. Neural networks vs . decision trees for intrusion detection , 2006 .
[15] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.