Cloud denial of service detection by dendritic cell mechanism
暂无分享,去创建一个
Othman Mohd Yusop | Azuan Ahmad | Norbik Bashah Idris | Mohd Nazri Kama | Nur Azaliah A Bakar | M. Kama | Azuan Ahmad | N. A. A. Bakar | N. Idris | O. Yusop
[1] Sameer Patil,et al. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES , 2014 .
[2] Satish Chandra,et al. An Optimistic Approach for Intrusion Security in Cloud , 2014 .
[3] Graham Kendall,et al. Frequency analysis for dendritic cell population tuning , 2008, Evol. Intell..
[4] Carlos Becker Westphall,et al. Autonomic Intrusion Detection System in Cloud Computing with Big Data , 2014 .
[5] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[6] Kevin Curran,et al. Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..
[7] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[8] Padam Kumar,et al. VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud , 2013, SSCC.
[9] Sherif Abdelwahed,et al. A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.
[10] B. Joshi,et al. Securing cloud computing environment against DDoS attacks , 2012, 2012 International Conference on Computer Communication and Informatics.
[11] Chi-Chun Lo,et al. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.
[12] Muhammad Zakarya,et al. DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing , 2013 .
[13] Reza Azmi,et al. SHADuDT: Secure hypervisor-based anomaly detection using danger theory , 2013, Comput. Secur..
[14] Adeel Anjum,et al. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..
[15] Tahir Alyas,et al. Intrusion Detection and Prevention in Cloud Computing using Genetic Algorithm , 2015 .
[16] Jie Xu,et al. A novel intrusion severity analysis approach for Clouds , 2013, Future Gener. Comput. Syst..
[17] Gary B. Lamont,et al. A distributed architecture for a self-adaptive computer virus immune system , 1999 .
[18] Jinpeng Wei,et al. Toward protecting control flow confidentiality in cloud-based computation , 2015, Comput. Secur..
[19] Luis Miguel Vaquero Gonzalez,et al. Building safe PaaS clouds: A survey on security in multitenant software platforms , 2012, Comput. Secur..