CIDS: A Framework for Intrusion Detection in Cloud Systems
暂无分享,去创建一个
[1] Alfonso Valdes,et al. An Approach to Sensor Correlation , 2000 .
[2] Wayne A. Jansen,et al. Intrusion detection with mobile agents , 2002, Comput. Commun..
[3] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[4] Chao-Tung Yang,et al. Integrating grid with intrusion detection , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[5] M. F. Tolba,et al. GIDA : Toward Enabling Grid Intrusion Detection Systems , 2005 .
[6] Hisham A. Kholidy. A study for access control flow analysis with a proposed job analyzer component based on stack inspection methodology , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.
[7] Dan Andersson,et al. Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis , 2001 .
[8] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[9] Stuart Kenny,et al. Towards a Grid-wide Intrusion Detection System , 2005, EGC.
[10] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[11] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[12] Boleslaw K. Szymanski,et al. Sequence alignment for masquerade detection , 2008, Comput. Stat. Data Anal..
[13] Abderrahim Sekkaki,et al. Intrusion Detection for Computational Grids , 2008, 2008 New Technologies, Mobility and Security.
[14] Chao-Tung Yang,et al. A performance-based grid intrusion detection system , 2005, 29th Annual International Computer Software and Applications Conference (COMPSAC'05).
[15] Xiaoshe Dong,et al. GHIDS: Defending Computational Grids against Misusing of Shared Resources , 2006, 2006 IEEE Asia-Pacific Conference on Services Computing (APSCC'06).
[16] Azman Samsudin,et al. Grid-based intrusion detection system , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).
[17] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[18] Wayne Jansen,et al. Applying Mobile Agents to Intrusion Detection and Response , 1999 .
[19] Richard J. Feiertag,et al. A separation model for virtual machine monitors , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Christoph Meinel,et al. Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[21] Kamalrulnizam Abu Bakar,et al. Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.
[22] W. A. Jansen,et al. MOBILE AGENTS AND SECURITY , 1999 .
[23] Paul Scerri,et al. Coordination of Large-Scale Multiagent Systems , 2005 .