-
2
-
-
77954695824
-
-
V. 1.0
-
"Top Threats to Cloud Computing", Cloud Security Alliance, http://www.cloudsecurityalliance.org/csaguide.pdf, V. 1.0 (2010)
-
(2010)
Top Threats to Cloud Computing
-
-
-
3
-
-
62949225623
-
Cloud Computing and Grid Computing 360-Degree Compared
-
Nov.
-
Foster, I.; Yong Zhao; Raicu, I.; Lu, S., "Cloud Computing and Grid Computing 360-Degree Compared", Grid Computing Environments Workshop, GCE '08, vol., no., pp.1-10, Nov. 2008
-
(2008)
Grid Computing Environments Workshop, GCE '08
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
7
-
-
33750942018
-
Grid-based intrusion detection system
-
September 21-24
-
O. Choon and A. Samsudin, "Grid-based intrusion detection system," in Proc. 9th Asia-Pacific Conference on Communications, vol. 3, pp. 1028-1032, September 21-24,2003.
-
(2003)
Proc. 9th Asia-Pacific Conference on Communications
, vol.3
, pp. 1028-1032
-
-
Choon, O.1
Samsudin, A.2
-
8
-
-
24944472363
-
Towards a grid-wide intrusion detection system
-
Amsterdam, Netherland, February
-
S. Kenny and B. Coghlan, "Towards a grid-wide intrusion detection system," in Proc. European Grid. Conference (EGC2005), pp.275-284, Amsterdam, Netherland, February 2005
-
(2005)
Proc. European Grid. Conference (EGC2005)
, pp. 275-284
-
-
Kenny, S.1
Coghlan, B.2
-
9
-
-
33744460532
-
Integrating Grid with Intrusion Detection
-
March
-
F-Y. Leu, Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, and Po-Chi Shih, "Integrating Grid with Intrusion Detection", Proc. Int'l Conf. Advanced Information Networking and Applications (AINA 05), vol. 1, March, 2005, pp. 304-309
-
(2005)
Proc. Int'l Conf. Advanced Information Networking and Applications (AINA 05)
, vol.1
, pp. 304-309
-
-
Leu, F.-Y.1
Leu, F.-Y.2
Lin, J.-C.3
Li, M.-C.4
Yang, C.-T.5
Shih, P.-C.6
-
10
-
-
84863960322
-
GIDA: Toward enabling grid intrusion detection systems
-
M. Tolba, M. Abdel-Wahab, and I. Taha, and A. Al-Shishtawy, "GIDA: Toward enabling grid intrusion detection systems", in Proc. 5th IEEE/ACM Int. Symp. on Cluster Computing and the Grid (CCGrid2005), Cardiff, UK, May 9-12, 2005.
-
Proc. 5th IEEE/ACM Int. Symp. on Cluster Computing and the Grid (CCGrid2005), Cardiff, UK, May 9-12, 2005
-
-
Tolba, M.1
Abdel-Wahab, M.2
Taha, I.3
Al-Shishtawy, A.4
-
11
-
-
33746812745
-
A Performance-Based Grid Intrusion Detection System
-
July
-
Fang-Yie L., Jia-Chun L., Ming-Chang L., and Chao-Tung Y., "A Performance-Based Grid Intrusion Detection System," in Proc. 29th Annual IEEE International Computer Software and Applications Conference (COMPSAC), pp.525-530, July, 2005
-
(2005)
Proc. 29th Annual IEEE International Computer Software and Applications Conference (COMPSAC)
, pp. 525-530
-
-
Fang-Yie, L.1
Jia-Chun, L.2
Ming-Chang, L.3
Chao-Tung, Y.4
-
12
-
-
39749099258
-
GHIDS: Defending Computational Grids against Misusing of Shared Resource
-
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, and Junyang Li, "GHIDS: Defending Computational Grids against Misusing of Shared Resource", Proc. Asia-Pacific Conf. Services Computing (APSCC 06), December.2006, pp. 526-533.
-
Proc. Asia-Pacific Conf. Services Computing (APSCC 06), December.2006
, pp. 526-533
-
-
Feng, G.1
Dong, X.2
Liu, W.3
Chu, Y.4
Li, J.5
-
13
-
-
58049176423
-
Intrusion Detection for Computational Grids
-
IEEE Press, November
-
Schulter, A.; Navarro, F.; Koch, F.; Westphall, C.B., "Intrusion Detection for Computational Grids", Proc. 2nd Int'l Conf. New Technologies, Mobility, and Security, IEEE Press, November, 2008, pp. 1-5.
-
(2008)
Proc. 2nd Int'l Conf. New Technologies, Mobility, and Security
, pp. 1-5
-
-
Schulter, A.1
Navarro, F.2
Koch, F.3
Westphall, C.B.4
-
15
-
-
77949590054
-
Distributed Instrusion Detection in Clouds Using Mobile Agents
-
Amir Vahid Dastjerdi, Kamalrulnizam Abu Bakar, Sayed Gholam Hassan Tabatabaei, "Distributed Instrusion Detection in Clouds Using Mobile Agents", Third International Conference on Advanced Engineering Computing and Application in Sciences, October 11-16, 2009 - Sliema, Malta
-
Third International Conference on Advanced Engineering Computing and Application in Sciences, October 11-16, 2009 - Sliema, Malta
-
-
Dastjerdi, A.V.1
Bakar, K.A.2
Tabatabaei, S.G.H.3
-
16
-
-
84889958844
-
-
booktitle Springer US, isbn: 978-0-387-27972-5
-
Scerri, Paul and Vincent, Régis and Mailler, Roger, booktitle "Coordination of Large-Scale Multiagent Systems", Springer US, isbn: 978-0-387-27972-5, p. 231-254, 2006
-
(2006)
Coordination of Large-Scale Multiagent Systems
, pp. 231-254
-
-
Scerri, P.1
Vincent, R.2
Mailler, R.3
-
17
-
-
0037105912
-
Intrusion detection with mobile agents
-
W. A. Jansen, "Intrusion detection with mobile agents", Computer communication (15): page: 1392-1401, 2002.
-
(2002)
Computer Communication
, Issue.15
, pp. 1392-1401
-
-
Jansen, W.A.1
-
18
-
-
77950559014
-
Intrusion Detection in the Cloud
-
Roschke, S., Cheng, F., Meinel, "Intrusion Detection in the Cloud", The 8th International Conference on Dependable, Autonomic and Secure Computing (DASC-09) China, Dec. 2009
-
The 8th International Conference on Dependable, Autonomic and Secure Computing (DASC-09) China, Dec. 2009
-
-
Roschke, S.1
Cheng, F.2
Meinel3
-
20
-
-
84863960325
-
-
http://www.ossec.net/main/
-
-
-
-
21
-
-
41249096616
-
Sequence alignment for masquerade detection
-
April 2008
-
Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric A. Breimer. 2008. "Sequence alignment for masquerade detection". Journal of Computational Statistics & Data Analysis. 52, 8 (April 2008), 4116-4131. http://dx.doi.org/10.1016/j.csda.2008.01.022.
-
(2008)
Journal of Computational Statistics & Data Analysis
, vol.52
, Issue.8
, pp. 4116-4131
-
-
Coull, S.E.1
Branch, J.W.2
Szymanski, B.K.3
Breimer, E.A.4
-
25
-
-
84863921427
-
-
http://www.snort.org/
-
-
-
-
27
-
-
84863960327
-
-
http://www.di.unipi.it/~hkholidy/projects/cids
-
-
-
|