-
1
-
-
84855919430
-
-
International Data Corporation (IDC), June
-
International Data Corporation (IDC), "The 2011 digital universe: Extracting value from chaos," Online, June 2011, http://www.emc.com/ collateral/demos/microsites/emc-digital-universe-2011/index.htm.
-
(2011)
"The 2011 Digital Universe: Extracting Value from Chaos," Online
-
-
-
2
-
-
84868097776
-
10 Valid reasons to choose cloud hosting for your business
-
Online, 14 February
-
Ants Magazine, "10 valid reasons to choose cloud hosting for your business," Online, 14 February 2012, http://www.antsmagazine.com/articles/ 10-valid-reasons-to-choose-cloud-hosting-for-your-business.
-
(2012)
Ants Magazine
-
-
-
4
-
-
84856151079
-
-
20, November
-
D. Catteddu and G. Hogben, "Benefits, risks and recommendations for information security," Online, 20, November 2009, http://www.enisa.europa. eu/activities/risk-management/files/deliverables/cloud-computing-risk- assessment.
-
(2009)
"Benefits, Risks and Recommendations for Information Security," Online
-
-
Catteddu, D.1
Hogben, G.2
-
6
-
-
32644465248
-
-
June
-
M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, "Insider threat study: Illicit cyber activity in the banking and finance sector," Online, June 2005, http://oai.dtic.mil/oai/oai?verb= getRecord&metadataPrefix=html&identifier=ADA441249.
-
(2005)
"Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector," Online
-
-
Randazzo, M.R.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
7
-
-
33644904044
-
The role of behavioral research and profiling in malicious cyber insider investigations
-
[Online]. Available
-
D. Eric and Shaw, "The role of behavioral research and profiling in malicious cyber insider investigations," Digital Investigation, vol. 3, no. 1, pp. 20-31, 2006. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1742287606000090
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 20-31
-
-
Eric, D.1
Shaw2
-
8
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
[Online]. Available
-
E. Eugene and Schultz, "A framework for understanding and predicting insider attacks," Computers and Security, vol. 21, no. 6, pp. 526-531, 2002. [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S016740480201009X
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Eugene, E.1
Schultz2
-
11
-
-
84868088467
-
-
22, May
-
B. E. Binde, R. McRee, and T. J. OConnor, "Assessing outbound traffic to uncover advanced persisten threat," Online, 22, May 2011, http://www.sans.edu/student-files/projects/JWP-Binde-McRee-OConnor.pdf.
-
(2011)
"Assessing Outbound Traffic to Uncover Advanced Persisten Threat," Online
-
-
Binde, B.E.1
McRee, R.2
OConnor, T.J.3
-
14
-
-
84975527458
-
-
12, March Last Accessed 23 August, 2011
-
S. Nicholas J. Percoco, "Data exfiltration: How data gets out," Online, 12, March 2010, http://www.networksunlimited.com/site/Portals/0/Data\ %20Exfiltration\%20How\%20Data\%20Gets\%20Out.pdf Last Accessed 23 August, 2011.
-
(2010)
"Data Exfiltration: How Data Gets Out," Online
-
-
Nicholas, S.1
Percoco, J.2
-
17
-
-
38949094508
-
Taming virtualization
-
Jan.-Feb.
-
M. Carbone, W. Lee, and D. Zamboni, "Taming virtualization," Security Privacy, IEEE, vol. 6, no. 1, pp. 65-67, Jan.-Feb. 2008.
-
(2008)
Security Privacy, IEEE
, vol.6
, Issue.1
, pp. 65-67
-
-
Carbone, M.1
Lee, W.2
Zamboni, D.3
-
22
-
-
84937736219
-
-
13, May e-Security Group, WMG, University of Warwick
-
Creese, Goldsmith, Auty, and Hopkins, "Threat vectors in clouds and cascade vulnerability effects," 13, May 2010, e-Security Group, WMG, University of Warwick.
-
(2010)
Threat Vectors in Clouds and Cascade Vulnerability Effects
-
-
Creese1
Goldsmith2
Auty3
Hopkins4
-
23
-
-
84856897107
-
Cloud computing: Challenges and future directions
-
K. Choo, "Cloud computing: challenges and future directions," Trends & issues in crime and criminal justice, no. 400, pp. 381-400, 2010.
-
(2010)
Trends & Issues in Crime and Criminal Justice
, Issue.400
, pp. 381-400
-
-
Choo, K.1
|