Security intelligence for cloud management infrastructures
暂无分享,去创建一个
Stefan Berger | Shelly Garion | Dalit Naor | Josyula R. Rao | Alexandra Shulman-Peleg | Dimitrios E. Pendarakis | Enriquillo Valdez | Yosef Moatti | Yaron Weinsberg
[1] Cristiana Amza,et al. Stage-aware anomaly detection through tracking log points , 2014, Middleware.
[2] Ling Huang,et al. Online System Problem Detection by Mining Patterns of Console Logs , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[3] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[4] Charles R Meyer,et al. Seeing the invisible. , 2004, Minnesota medicine.
[5] Ryan K. L. Ko,et al. Cloud computing vulnerability incidents: a statistical overview , 2013 .
[6] Stefano Zanero,et al. Seeing the invisible: forensic uses of anomaly detection and machine learning , 2008, OPSR.
[7] Dimitrios Pendarakis,et al. Security audits of multi-tier virtual infrastructures in public infrastructure clouds , 2010, CCSW '10.
[8] Antonio Corradi,et al. Securing the infrastructure and the workloads of linux containers , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[9] Stephanie Forrest,et al. The Evolution of System-Call Monitoring , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[10] Matthias Schunter,et al. Automated Information Flow Analysis of Virtualized Infrastructures , 2011, ESORICS.
[11] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[12] Matei Zaharia,et al. Resilient Distributed Datasets , 2016 .
[13] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[14] Sean Thorpe,et al. Cloud computing log forensics-the new frontier , 2014, IEEE SOUTHEASTCON 2014.
[15] Michal Rosen-Zvi,et al. Smarter log analysis , 2011, IBM J. Res. Dev..
[16] R. Peleg,et al. Secure yet usable: Protecting servers and Linux containers , 2016, IBM J. Res. Dev..
[17] Sebastian Mödersheim,et al. Automated verification of virtualized infrastructures , 2011, CCSW '11.