-
1
-
-
84857609306
-
-
NIST SP SOO-1 45, The NIST Definition of Cloud Computing, NIST Special Publication SOO-145, January
-
NIST SP SOO-1 45, The NIST Definition of Cloud Computing, http://csrc.nist. gov/publications/drafts/SOO-1 45IDraft-SP-SOO-1 45-clouddefinition. pdf, NIST Special Publication SOO-145, January 2011 .
-
(2011)
-
-
-
2
-
-
77950559014
-
-
China
-
S. Roschke, F. Cheng, and C. Meinel, Intrusion Detection in the Cloud, Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DAS C ' 09), pp.729-734, China, 2009.
-
(2009)
Intrusion Detection in the Cloud Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC' 09
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
3
-
-
78651454769
-
Distributed proactive defe nse base d on cloud computing
-
95-98, Guilin, China, October 22-24
-
D. Song, L. Wei-min, Z. Tao, and Y. Yong, Distributed Proactive Defe nse base d on Cloud Computing, In International Conference on Intelligent Computing and Integrated Systems (ICISS), pp. 95-98, Guilin, China, October 22-24, 20 1 0.
-
(2010)
International Conference on Intelligent Computing and Integrated Systems (ICISS
-
-
Song, D.1
Wei-min, L.2
Tao, Z.3
Yong, Y.4
-
4
-
-
77949590054
-
Distribute d intrusion detection in clouds using mobile agents
-
Sliema, October 11-16
-
A. Y. Dastjerdi, K. A. Bakar, and S. G. H. Tabatabaei, Distribute d Intrusion Detection in Clouds Using Mobile Agents, In Third International Conference on Advanced Engineering Computing and Applications in Sciences (ADVCOMP' 09), pp. 175-1 80, Sliema, October 1 1-1 6 , 2009.
-
(2009)
Third International Conference on Advanced Engineering Computing and Applications in Sciences (ADVCOMP' 09
, pp. 175-180
-
-
Dastjerdi, A.Y.1
Bakar, K.A.2
Tabatabaei, S.G.H.3
-
5
-
-
78349296456
-
Integrating a network IDS into an open source cloud computing environment
-
Atlanta, GA, August 23-25
-
C. Mazzariello, R. Bifulco, and R. Canonico, Integrating a Network IDS into an Open Source Cloud Computing Environment, In Sixth International Conference on Information Assurance and Security (IAS '10), pp. 265-270, Atlanta, GA, August 23-25, 2010.
-
(2010)
Sixth International Conference on Information Assurance and Security (IAS '10
, pp. 265-270
-
-
Mazzariello, C.1
Bifulco, R.2
Canonico, R.3
-
6
-
-
84964940823
-
A collaborative approach to facilitate intrusion detection and response against DDOS attacks
-
Chicago, IL, October 9-12
-
S.T. Zargar, and J. Joshi, A Collaborative Approach to Facilitate Intrusion Detection and Response against DDoS Attacks, 6th Inti Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom'10), Chicago, IL, October 9-1 2 , 20 1 0.
-
(2010)
6th Inti Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom'10
-
-
Zargar, S.T.1
Joshi, J.2
-
7
-
-
34648817365
-
On the design and pe iformance of an adaptive
-
T. Znati, J. Amadei, D. R. Pazehoski, and S. Sweeny On the Design and Pe iformance of an Adaptive, Global Strategy for De te cting and Mitigating Distributed DoS Attacks in GRID and Collaborative Workflow Environments, Simulation, vol. 83, no. 3, pp. 29 1-303, 2007.
-
(2007)
Global Strategy for De te cting and Mitigating Distributed DoS Attacks in GRID and Collaborative Workflow Environments, Simulation
, vol.83
, Issue.3
, pp. 291-303
-
-
Znati, T.1
Amadei, J.2
Pazehoski, D.R.3
Sweeny, S.4
-
8
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defe nse mechanisms
-
J. Mirkovic, and P. Reiher, A taxonomy of DDoS attack and DDoS defe nse mechanisms, ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
ACM SIGCOMM Computer Communications Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
9
-
-
33846198398
-
Protecting host-based intrusion detectors through virtual machines
-
April
-
M. Laureano, C. Maziero, and E. Jamhour, Protecting host-based intrusion detectors through virtual machines, Computer Networks, vol. 51 , no. 5, pp. 1 275-1 283, April 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1275-1283
-
-
Laureano, M.1
Maziero, C.2
Jamhour, E.3
-
11
-
-
74849123192
-
A review of classification methods for network vulnerability
-
San Antonio, TX, October 11-14
-
S. Jin, Y. Wang, X. Cui, and X. Yun A review of classification methods for network vulnerability, in Systems, Man and Cybernetics (SMC ' 09), San Antonio, TX, October 1 1-1 4, 2009.
-
(2009)
Systems, Man and Cybernetics (SMC ' 09
-
-
Jin, S.1
Wang, Y.2
Cui, X.3
Yun, X.4
-
12
-
-
85085406935
-
Matching attack patte rns to security vulne rabilities in software-intensive system designs
-
May
-
M. Gegick, and L. Williams Matching attack patte rns to security vulne rabilities in software-intensive system designs, SIGSOFT Softw. Eng. Notes, Vol. 30, no. 4, pp. 1-7, May 2005.
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.4
, pp. 1-7
-
-
Gegick, M.1
Williams, L.2
-
13
-
-
78650608265
-
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations
-
February
-
H. Shahriar, and M. Zulkernine Taxonomy and classification of automatic monitoring of program security vulnerability exploitations, Journal of Systems and Software, Vol. 84, no. 2, pp. 250-269, February 2011 .
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.2
, pp. 250-269
-
-
Shahriar, H.1
Zulkernine, M.2
-
14
-
-
0038226150
-
-
CMU/SEI-2001-TN-00 1 , Software Engineering Institute, Carnegie Mellon University, March
-
P. Moore, R. J. Ellison, and R. C. Linger Attack Modeling for Information Security and Survivability, CMU/SEI-2001-TN-00 1 , Software Engineering Institute, Carnegie Mellon University, March 2001 .
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, P.1
Ellison, R.J.2
Linger, R.C.3
-
16
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing Automated Generation and Analysis of Attack Graphs, IEEE Symposium on Security and Privacy, IEEE Computer Society, 2002.
-
(2002)
IEEE Symposium on Security and Privacy, IEEE Computer Society
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
19
-
-
84944738739
-
Collaborative intrusion detection system (ClDS): A framework for accurate and efficient IDS
-
December
-
w. Yu-Sung, B. Foo, Y. Mei, and S. Bagchi Collaborative intrusion detection system (ClDS): A framework for accurate and efficient IDS, 19th Annual Computer Security Applications Conference, pp. 234-244, December 2003.
-
(2003)
19th Annual Computer Security Applications Conference
, pp. 234-244
-
-
Yu-Sung, W.1
Foo, B.2
Mei, Y.3
Bagchi, S.4
-
20
-
-
84857536386
-
-
NIST SP 800-30, Risk Management Guide for Iriformation Te chnology Systems, Publication 800-30, July
-
NIST SP 800-30, Risk Management Guide for Iriformation Te chnology Systems, http://csrc.nist. gov/publications/nistpubs/800-30/sp800-30.pdf, NIST Special Publication 800-30, July 2002.
-
(2002)
-
-
-
21
-
-
0012930257
-
Digital gove rnment security and privacy challenges
-
William J. Mciver, Jf. and Ahmed K. Elmagarmid (eds), Boston, KJuwer, Chapter 7
-
J. B. D. Joshi, A. Ghafoor, W. Aref, and E. H. Spafford Digital Gove rnment Security and Privacy Challenge s, William J. Mciver, Jf. and Ahmed K. Elmagarmid (eds) Advances in Digital Government: Technology, Human Factors, and Policy, Boston, KJuwer, Chapter 7, pp. 1 2 1-1 36, 2002.
-
(2002)
Advances in Digital Government: Technology, Human Factors, and Policy
, pp. 121-136
-
-
Joshi, J.B.D.1
Ghafoor, A.2
Aref, W.3
Spafford, E.H.4
-
22
-
-
0003411763
-
-
Technical Report CSE-95 1 O , Department of Computer Science, University of California at Davis, May 1
-
M. Bishop A Taxonomy of Unix System and Network Vulne rabilitie s, Technical Report CSE-9 5 1 O , Department of Computer Science, University of California at Davis, May 1995.
-
A Taxonomy of Unix System and Network Vulne Rabilities
, pp. 995
-
-
Bishop, M.1
-
23
-
-
17044381780
-
Models and simulations for large scale IP networks
-
Y. Liu, F. L. Presti, Y. Misra, D. Towsley, and Y. Gu Scalable Fluid Models and Simulations for Large Scale IP Networks, ACM Transactions on Modeling and Computer Simulation, Vol. 14, No. 3, 2004.
-
(2004)
ACM Transactions on Modeling and Computer Simulation
, vol.14
, Issue.3
-
-
Liu, Y.1
Presti, F.L.2
Misra, Y.3
Towsley, D.4
Gu Scalable, Y.5
-
24
-
-
78649806730
-
Se cure cloud: Towards a compre hensive security framework for cloud computing environments, 341
-
Seoul, South Korea
-
H. Takabi, J.B.D. Joshi, and G.-J. Ahn, Se cure Cloud: Towards a Compre hensive Security Framework for Cloud Computing Environments, 341 In Proc. of the 1 st IEEE International Workshop Emerging Applications for Cloud Computing (CloudApp 20 1 0), pp. 393-39 8, Seoul, South Korea, 2010.
-
(2010)
Proc. of the 1 st IEEE International Workshop Emerging Applications for Cloud Computing (Cloud App 2010
, pp. 393-398
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
25
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J. B. D. Joshi, and G. J. Ahn, Security and Privacy Challenges in Cloud Computing Environments, IEEE Security and Privacy, Vol. 8, No. 6, pp. 25-3 1 , 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 25-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.J.3
-
26
-
-
77954931494
-
Intrusion detection for grid and cloud computing
-
July-Aug.
-
K. Vieira, A. Schulter, C. B. WestphaU, and C. M. Westphall, Intrusion Detection for Grid and Cloud Computing, In IT Professional, Vol. 1 2 , no. 4, pp. 38-43, July-Aug. 20 1 0.
-
(2010)
IT Professional
, vol.12
, Issue.4
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westpha, C.B.3
Westphall, C.M.4
-
27
-
-
79952409740
-
CloudSEC: A Cloud Archite cture for Composing Collaborative Security Services
-
Indianapolis, IN, Nov. 30-Dec. 3
-
J. Xu, J. Yan, L. He, P. Su, and D. Feng, CloudSEC: A Cloud Archite cture for Composing Collaborative Security Se rvices, In IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom'10), pp. 703-711, Indianapolis, IN, Nov. 30-Dec. 3, 2010.
-
(2010)
IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom'10
, pp. 703-711
-
-
Xu, J.1
Yan, J.2
He, L.3
Su, P.4
Feng, D.5
-
28
-
-
78649864973
-
An anomaly detection framework for autonomic management of compute cloud systems
-
Seoul, Japan, July 19-23
-
D. Smith, Q. Guan, and S. Fu, An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems, In IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 376-38 1 , Seoul, Japan, July 19-23, 2010.
-
(2010)
IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW
, pp. 376-381
-
-
Smith, D.1
Guan, Q.2
Fu, S.3
|