-
1
-
-
77954695824
-
-
Cloud Security Alliance
-
Cloud Security Alliance, Top Threats to Cloud Computing. www.cloudsecurityalliance.org/topthreats/csathreats.v1. 0.pdf, 2010.
-
(2010)
Top Threats to Cloud Computing
-
-
-
2
-
-
84888036896
-
-
Google cloud platform used for botnet control. 2012
-
Google cloud platform used for botnet control. http://www.infosecurity- us.com/view/5115/ google-cloud-platform-used-for-botnet-control, 2012.
-
-
-
-
3
-
-
84888029626
-
-
Maxmind., 2012
-
Maxmind. http://www.maxmind.com, 2012.
-
-
-
-
4
-
-
84888025074
-
-
PlanetLab., 2012
-
PlanetLab. http://www.planet-lab.org, 2012.
-
-
-
-
7
-
-
77950347409
-
A view of cloud computing
-
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. A view of cloud computing. Commun. ACM, 2010.
-
(2010)
Commun. ACM
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
10
-
-
70449625632
-
Combining incremental hidden markov model and adaboost algorithm for anomaly intrusion detection
-
Y. Chen Chen. Combining incremental hidden markov model and adaboost algorithm for anomaly intrusion detection. 2009. KDD Workshop on CyberSecurity and Intelligence Informatics.
-
(2009)
KDD Workshop on CyberSecurity and Intelligence Informatics
-
-
Chen Chen, Y.1
-
12
-
-
12244286335
-
Systematic data selection to mine concept-drifting data streams
-
Fan. Systematic data selection to mine concept-drifting data streams. 2004. ACM SIGKDD.
-
(2004)
ACM SIGKDD
-
-
-
13
-
-
0041657519
-
Interior point methods for massive support vector machines
-
T. Munson Ferris. Interior point methods for massive support vector machines. 2003. SIAM J. Optim.
-
(2003)
SIAM J. Optim
-
-
Munson Ferris, T.1
-
16
-
-
12244300520
-
Eigenspace-based anomaly detection in computer systems
-
IDE and H. Kashima. Eigenspace-based anomaly detection in computer systems. 2004. ACM SIGKDD.
-
(2004)
ACM SIGKDD
-
-
Ide1
Kashima, H.2
-
17
-
-
61749085938
-
Comparing anomaly detection techniques for http
-
L. Ingham and H. Inoue. Comparing anomaly detection techniques for http. 2007. RAID.
-
(2007)
RAID
-
-
Ingham, L.1
Inoue, H.2
-
18
-
-
56749157104
-
Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks
-
A. Carvalho J. Spinosa and J. Gama. Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks. 2008. ACM symposium on Applied computing.
-
(2008)
ACM Symposium on Applied Computing
-
-
Carvalho, A.1
Spinosa, J.2
Gama, J.3
-
20
-
-
78650154288
-
A new form of dos attack in a cloud and its avoidance mechanism
-
Liu. A new form of dos attack in a cloud and its avoidance mechanism. 2010. ACM CCSW.
-
(2010)
ACM CCSW
-
-
Liu1
-
23
-
-
84888073746
-
Mining concept drifting network traffic in cloud computing environments
-
S. Mukkavilli and S. Shetty. "mining concept drifting network traffic in cloud computing environments. In CCGRID. ACM/IEEE, 2012.
-
(2012)
CCGRID. ACM/IEEE
-
-
Mukkavilli, S.1
Shetty, S.2
-
24
-
-
84888067067
-
Assessing network path vulnerabilities for secure cloud computing
-
Shetty S. Reddy, S. and X. Xiong. Assessing network path vulnerabilities for secure cloud computing. In CCGRID. ACM/IEEE, 2013.
-
(2013)
CCGRID. ACM/IEEE
-
-
Reddy, S.S.S.1
Xiong, X.2
-
25
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, New York, NY, USA, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
27
-
-
84888032271
-
Online semi-smooth support vector machine for incremental learning
-
M. Song Shetty, T. Munson. Online semi-smooth support vector machine for incremental learning. 2012. submitted to Journal of Computer Security.
-
(2012)
Journal of Computer Security
-
-
Song Shetty, M.1
Munson, T.2
-
28
-
-
77953302052
-
The impact of virtualization on network performance of amazon ec2 data center
-
Wang and T. S. E. Ng. The impact of virtualization on network performance of amazon ec2 data center. pages 1163-1171, 2010. INFOCOM.
-
(2010)
INFOCOM
, pp. 1163-1171
-
-
Wang, T.S.1
Ng, E.2
-
29
-
-
0030126609
-
Learning in the presence of concept drifting and hidden contexts
-
Widmer and M. Kubat. Learning in the presence of concept drifting and hidden contexts. pages 69-101, 1996. Machine Learning.
-
(1996)
Machine Learning
, pp. 69-101
-
-
Widmer, M.K.1
|