暂无分享,去创建一个
[1] Akbar Siami Namin,et al. Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy? , 2019, 2019 IEEE International Conference on Big Data (Big Data).
[2] Ragib Hasan,et al. Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service , 2016, IEEE Transactions on Dependable and Secure Computing.
[3] Kim-Kwang Raymond Choo. Cloud computing: Challenges and future directions , 2010 .
[4] Ragib Hasan,et al. FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things , 2015, 2015 IEEE International Conference on Services Computing.
[5] Shufen Zhang,et al. Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.
[6] Alan T. Sherman,et al. Design and Implementation of FROST - Digital Forensic Tools for the OpenStack Cloud Computing Platform , 2016 .
[7] Moitrayee Chatterjee,et al. Detecting Phishing Websites through Deep Reinforcement Learning , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).
[8] Akbar Siami Namin,et al. Vulnerability coverage for adequacy security testing , 2020, SAC.
[9] Akbar Siami Namin,et al. Abuse of the Cloud as an Attack Platform , 2020, 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC).
[10] Vijay Varadharajan,et al. Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..
[11] Sara Sartoli,et al. A semantic model for action-based adaptive security , 2017, SAC.
[12] Akbar Siami Namin,et al. Detecting Web Spams Using Evidence Theory , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[13] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.
[14] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .