-
1
-
-
79952065844
-
-
7 May 2011, Available
-
J. Archer, A. Boehme, D. Cullinane, P. Kurtz, N. Puhlmann, and J. Reavis. (2010, 7 May 2011). Top Threats to Cloud Computing, Version 1.0. Available: http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.
-
(2010)
Top Threats to Cloud Computing, Version 1.0
-
-
Archer, J.1
Boehme, A.2
Cullinane, D.3
Kurtz, P.4
Puhlmann, N.5
Reavis, J.6
-
3
-
-
78650039008
-
Cloud computing roundtable
-
IEEE
-
E. Grosse, J. Howie, J. Ransome, J. Reavis, and S. Schmidt, "Cloud computing roundtable, " Security & Privacy, IEEE, vol. 8, pp. 17-23, 2010.
-
(2010)
Security & Privacy
, vol.8
, pp. 17-23
-
-
Grosse, E.1
Howie, J.2
Ransome, J.3
Reavis, J.4
Schmidt, S.5
-
7
-
-
77949849343
-
-
M. Yildiz, J. Abawajy, T. Ercan, and A. Bernoth, "A layered security approach for cloud computing infrastructure, " 2009, pp. 763-767.
-
(2009)
A Layered Security Approach for Cloud Computing Infrastructure
, pp. 763-767
-
-
Yildiz, M.1
Abawajy, J.2
Ercan, T.3
Bernoth, A.4
-
8
-
-
79957992460
-
-
K. Dahbur, B. Mohammad, and A. B. Tarakji, "A survey of risks, threats and vulnerabilities in cloud computing, " 2011, p. 12.
-
(2011)
A Survey of Risks, Threats and Vulnerabilities in Cloud Computing
, pp. 12
-
-
Dahbur, K.1
Mohammad, B.2
Tarakji, A.B.3
-
9
-
-
70449569012
-
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing, " 2009, pp. 1- 9.
-
(2009)
Ensuring Data Storage Security in Cloud Computing
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
10
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
L. Yan, C. Rong, and G. Zhao, "Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography, " Cloud Computing, pp. 167-177, 2009.
-
(2009)
Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
12
-
-
74049152260
-
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, " 2009, pp. 199- 212.
-
(2009)
Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
13
-
-
84856193253
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, "Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks, " Journal of Network and Computer Applications, 2010.
-
(2010)
Journal of Network and Computer Applications
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
15
-
-
84856193252
-
-
19 June 2011, Available
-
J. Grossman. (2011, 19 June 2011). Jeremiah Grossman. Available: http://jeremiahgrossman.blogspot.com/.
-
(2011)
Jeremiah Grossman
-
-
Grossman, J.1
-
17
-
-
33749870712
-
A variational formulation for the multilayer perceptron
-
Artificial Neural Networks, ICANN 2006 - 16th International Conference, Proceedings
-
R. Lopez and E. Onate, "A variational formulation for the multilayer perceptron, " Artificial Neural Networks- ICANN 2006, pp. 159-168, 2006. (Pubitemid 44561664)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4131 LNCS - I
, pp. 159-168
-
-
Lopez, R.1
Onate, E.2
-
21
-
-
0020083498
-
The meaning and use of the area under a receiver operating characteristic (ROC) curve
-
A. James and J. Barbara, "The meaning and use of the area under a receiver operating characteristic (ROC) curve, " Radiology, vol. 143, pp. 29-36, 1982.
-
(1982)
Radiology
, vol.143
, pp. 29-36
-
-
James, A.1
Barbara, J.2
-
22
-
-
85025426066
-
Characteristic (ROC) Curvel
-
J. A. Hanley, "Characteristic (ROC) Curvel, " Radiology, vol. 743, pp. 29-36, 1982.
-
(1982)
Radiology
, vol.743
, pp. 29-36
-
-
Hanley, J.A.1
|