Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks
暂无分享,去创建一个
[1] Djamal Zeghlache,et al. Inter and intra Cloud Networking Gateway as a service , 2013, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet).
[2] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[3] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[4] Jinyuan You,et al. Multiparty authentication services and key agreement protocols with semi-trusted third party , 2008, Journal of Computer Science and Technology.
[5] D. Kovachev,et al. Beyond the client-server architectures: A survey of mobile cloud techniques , 2012, 2012 1st IEEE International Conference on Communications in China Workshops (ICCC).
[6] John E. Gaffney,et al. Evaluation of Intrusion Detection Systems , 2003, Journal of research of the National Institute of Standards and Technology.
[7] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[8] Shanshan Song,et al. Collaborative Internet Worm Containment , 2005, IEEE Secur. Priv..
[9] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[10] Gene Tsudik,et al. New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.
[11] Ahsan Habib,et al. SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING , 2013 .
[12] Kai Hwang,et al. Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.
[13] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[14] Zhibin Zhou,et al. Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[15] M. Chuah,et al. Spam Detection on Twitter Using Traditional Classifiers , 2011, ATC.
[16] Medromi Hicham,et al. A collaborative intrusion detection and Prevention System in Cloud Computing , 2013, 2013 Africon.
[17] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[18] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[19] Marc Lacoste,et al. Flying over Mobile Clouds with Security Planes: Select Your Class of SLA for End-to-End Security , 2013, 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing.
[20] Jason Flinn,et al. Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.
[21] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[22] R. Subramanian,et al. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.
[23] Mathias Slawik,et al. The Trusted Cloud Transfer Protocol , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[24] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[25] Christos Grecos,et al. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications , 2014, Photonics Europe.