Proposed architecture for intrusion detection system for software as a service in cloud computing environment
暂无分享,去创建一个
Suriayati Chuprat | Norbik Bashah Idris | Ganthan Narayana Samy | Bharanidharan Shanmugam | Azuan Ahmed
[1] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[2] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[3] Mark John Taylor,et al. Forensic investigation of cloud computing systems , 2011, Netw. Secur..
[4] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[5] Sajjad Haider,et al. Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[6] Jeffrey O. Kephart,et al. A biologically inspired immune system for computers , 1994 .
[7] Nur Izura Udzir,et al. A Cloud-based Intrusion Detection Service framework , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[8] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[10] Norbik Bashah Idris,et al. Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks , 2009, 2009 International Conference of Soft Computing and Pattern Recognition.
[11] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..