-
2
-
-
79956153885
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
Advanced Topics in Cloud Computing, July
-
Ashley Chonka, Yang Xiang, Wanlei Zhou, Alessio Bonti, "Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks", Journal of Network and Computer Applications, Volume 34, Issue 4, Advanced Topics in Cloud Computing, July 2011,(http://www.sciencedirect.com/ science/article/pii/S1084804510001025)
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
3
-
-
84857145626
-
-
pro10004@fe.up.pt
-
Paulo Neto, Demystifying Cloud Computing, pro10004@fe.up.pt http://paginas.fe.up.pt/~prodei/dsie11/images/pdfs/s6-3.pdf
-
Demystifying Cloud Computing
-
-
Neto, P.1
-
4
-
-
84857178701
-
-
Wikipedia, http://www.wikipedia.org/
-
-
-
-
5
-
-
77954068353
-
Eucalyptus: An open-source cloud computing infrastructure
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff and D. Zagorodnov, "Eucalyptus: an open-source cloud computing infrastructure", Journal of Physics: Conference Series, vol. 180, 2009
-
(2009)
Journal of Physics: Conference Series
, vol.180
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
7
-
-
84857158452
-
Forensic challenges for handling incidents and crime in cyberspace
-
The Farm Inn, Pretoria, 27 - 29 October 2009
-
Taute, B, Grobler, M and Nare, S. 2009. "Forensic challenges for handling incidents and crime in cyberspace." Technology and the Law Converge Conference, The Farm Inn, Pretoria, 27 - 29 October 2009, pp 1-39
-
(2009)
Technology and the Law Converge Conference
, pp. 1-39
-
-
Taute, B.1
Grobler, M.2
Nare, S.3
-
8
-
-
74349113474
-
On technical security issues in cloud computing
-
Bangalore, India, September 2009
-
Jensen, M., Schwenk, J. O., Gruschka, N. and Iacono, L. L. 2009. "On Technical Security Issues in Cloud Computing." In IEEE International Conference on Cloud Computing (CLOUD-II 2009), Bangalore, India, September 2009, 109-116.
-
(2009)
IEEE International Conference on Cloud Computing (CLOUD-II 2009)
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.O.2
Gruschka, N.3
Iacono, L.L.4
-
9
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
January 2011
-
Subashini S, Kavitha V., "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications (2011) volume 34 issue 1, January 2011 pp. 1-11.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
10
-
-
77950559014
-
Intrusion detection in the cloud
-
Sebastian Roschke, Feng Cheng and Christoph Meinel, "Intrusion Detection in the Cloud," Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp.729-734.
-
(2009)
Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
12
-
-
47749117614
-
SOA and web services: New technologies, new standards - New attacks
-
Nov.
-
M. Jensen, N. Gruschka, R. Herkenhoner, and N. Luttenberger, "SOA and Web Services: New Technologies, New Standards - New Attacks," Fifth European Conference on Web Services, pp. 35-44, Nov. 2007
-
(2007)
Fifth European Conference on Web Services
, pp. 35-44
-
-
Jensen, M.1
Gruschka, N.2
Herkenhoner, R.3
Luttenberger, N.4
|