Data Sources and Datasets for Cloud Intrusion Detection Modeling and Evaluation
暂无分享,去创建一个
[1] Rajiv Gandhi Salai,et al. Virtual Host based Intrusion Detection System for Cloud , 2014 .
[2] G. Fenu,et al. An approach to a Cloud Computing network , 2008, 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT).
[3] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[4] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[5] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[6] Sanjay Jha,et al. Processing resource scheduling in programmable networks , 2005, Comput. Commun..
[7] Fabrizio Baiardi,et al. CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[8] Ladan Tahvildari,et al. Cloud Computing Uncovered: A Research Landscape , 2012, Adv. Comput..
[9] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[10] Frederick R. Carlson,et al. Security Analysis of Cloud Computing , 2014, ArXiv.
[11] Sakshi Kaushal,et al. Security Concerns in Cloud Computing , 2011, Grid 2011.
[12] Aiko Pras,et al. Inside dropbox: understanding personal cloud storage services , 2012, Internet Measurement Conference.
[13] Dulal C. Kar,et al. Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose , 2005 .
[14] Sherri Davidoff. Cleartext Passwords in Linux Memory , 2008 .
[15] Ashutosh Saxena,et al. Energy analysis of security for cloud application , 2011, 2011 Annual IEEE India Conference.
[16] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[17] Jörg Schwenk,et al. Security Prospects through Cloud Computing by Adopting Multiple Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[18] Ralf Steinmetz,et al. Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.
[19] Malek Ben Salem,et al. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[20] Daniel Högberg,et al. An Applied Evaluation and Assessment of Cloud Computing Platforms , 2012 .
[21] L. D. Dhinesh Babu,et al. An Analysis of Security Related Issues in Cloud Computing , 2011, IC3.
[22] Wei Zhao. An Initial Review of Cloud Computing Services Research Development , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[23] Chris Fry,et al. Security Monitoring , 2009 .
[24] Zhuang Jin-lia. Research on Cloud Computing Security , 2014 .
[25] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[26] Joaquim Sousa Pinto,et al. Cloud Computing: A Platform of Services for Services , 2011, CENTERIS.
[27] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[28] Paul Rodrigues,et al. State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment , 2012, ICACCI '12.
[29] Dongho Won,et al. Security Issues and Threats According to the Attribute of Cloud Computing , 2012 .
[30] Zhang Yongsheng,et al. Cloud computing and cloud security challenges , 2012, 2012 International Symposium on Information Technologies in Medicine and Education.
[31] Weimin Wei,et al. A Deep Understanding of Cloud Computing Security , 2012 .
[32] Shufen Zhang,et al. Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.
[33] Weidong Liu,et al. Security Issues and Solutions in Cloud Computing , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[34] Manish Kumar Mishra,et al. AN IMPROVED ROUND ROBIN CPU SCHEDULING ALGORITHM , 2012 .
[35] Magda El Zarki,et al. Mastering networks - an internet lab manual , 2003 .
[36] Marvin Waschke. Cloud standards: agreements that hold together clouds / Marvin Waschke , 2012 .
[37] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[38] Alok Sharma,et al. Detecting Denial of Service Attacks in the Cloud , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).