-
1
-
-
79952065844
-
-
Mar
-
Coud Sercurity Alliance, "Top Threats to Cloud Computing v1.0," https://cloudsecurityalliance.org/topthreats/csathreats. v1.0.pdf, Mar. 2010.
-
(2010)
Top Threats to Cloud Computing v1.0
-
-
-
2
-
-
77950347409
-
A view of cloud computing
-
Apr
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," ACM Comm., vol. 53, no. 4, pp. 50-58, Apr. 2010.
-
(2010)
ACM Comm
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Dec
-
H. Takabi, J.B. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security and Privacy, vol. 8, no. 6, pp. 24-31, Dec. 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.2
Ahn, G.3
-
5
-
-
84897781728
-
-
May
-
"Open vSwitch Project," http://openvswitch.org, May 2012.
-
(2012)
Open VSwitch Project
-
-
-
6
-
-
84863407389
-
Detecting spam zombies by monitoring outgoing messages
-
Apr
-
Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J. Barker, "Detecting Spam Zombies by Monitoring Outgoing Messages," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 198-210, Apr. 2012.
-
(2012)
IEEE Trans. Dependable and Secure Computing
, vol.9
, Issue.2
, pp. 198-210
-
-
Duan, Z.1
Chen, P.2
Sanchez, F.3
Dong, Y.4
Stephenson, M.5
Barker, J.6
-
7
-
-
85061529860
-
BotHunter: Detecting malware infection through ids-driven dialog correlation
-
Aug
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "BotHunter: Detecting Malware Infection through IDS-driven Dialog Correlation," Proc. 16th USENIX Security Symp. (SS '07), pp. 12:1-12:16, Aug. 2007.
-
(2007)
Proc. 16th USENIX Security Symp. (SS '07)
, pp. 121-1216
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
9
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing, "Automated Generation and Analysis of Attack Graphs," Proc. IEEE Symp. Security and Privacy, pp. 273-284, 2002 (Pubitemid 34648119)
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
11
-
-
0038687692
-
Scalable, graphbased network vulnerability analysis
-
P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, graphbased network vulnerability analysis," Proc. 9th ACM Conf. Computer and Comm. Security (CCS '02), pp. 217-224, 2002.
-
(2002)
Proc. 9th ACM Conf. Computer and Comm. Security (CCS '02)
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
12
-
-
85076884574
-
MulVAL: A logic- based network security analyzer
-
X. Ou, S. Govindavajhala, and A.W. Appel, "MulVAL: A Logic-Based Network Security Analyzer," Proc. 14th USENIX Security Symp., pp. 113-128, 2005.
-
(2005)
Proc. 14th USENIX Security Symp
, pp. 113-128
-
-
Ou, X.1
Govindavajhala, S.2
Appel, A.W.3
-
14
-
-
33747198726
-
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
-
DOI 10.1016/j.comcom.2006.04.001, PII S014036640600137X
-
L. Wang, A. Liu, and S. Jajodia, "Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts," Computer Comm., vol. 29, no. 15, pp. 2917-2933, Sept. 2006. (Pubitemid 44232972)
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2917-2933
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
-
15
-
-
79958184435
-
A new alert correlation algorithm based on attack graph
-
S. Roschke, F. Cheng, and C. Meinel, "A New Alert Correlation Algorithm Based on Attack Graph," Proc. Fourth Int'l Conf. Computational Intelligence in Security for Information Systems, pp. 58-67, 2011.
-
(2011)
Proc. Fourth Int'l Conf. Computational Intelligence in Security for Information Systems
, pp. 58-67
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
17
-
-
81455142742
-
Dynamic security risk management using bayesian attack graphs
-
Feb
-
N. Poolsappasit, R. Dewri, and I. Ray, "Dynamic Security Risk Management Using Bayesian Attack Graphs," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 1, pp. 61-74, Feb. 2012.
-
(2012)
IEEE Trans. Dependable and Secure Computing
, vol.9
, Issue.1
, pp. 61-74
-
-
Poolsappasit, N.1
Dewri, R.2
Ray, I.3
-
19
-
-
84944719521
-
-
"Openflow," http://www.openflow.org/wp/learnmore/, 2012.
-
(2012)
Openflow
-
-
-
20
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
Mar
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: Enabling Innovation in Campus Networks," SIGCOMM Computer Comm. Rev., vol. 38, no. 2, pp. 69-74, Mar. 2008.
-
(2008)
SIGCOMM Computer Comm. Rev
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
21
-
-
77954969841
-
NoHype: Virtualized cloud infrastructure without the virtualization
-
June
-
E. Keller, J. Szefer, J. Rexford, and R.B. Lee, "NoHype: Virtualized Cloud Infrastructure without the Virtualization," Proc. 37th ACM Ann. Int'l Symp. Computer Architecture (ISCA '10), pp. 350-361, June 2010.
-
(2010)
Proc. 37th ACM Ann. Int'l Symp. Computer Architecture (ISCA '10)
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
22
-
-
34547239511
-
A scalable approach to attack graph generation
-
DOI 10.1145/1180405.1180446, 1180446, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
X. Ou, W.F. Boyer, and M.A. McQueen," A Scalable Approach to Attack Graph Generation," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 336-345, 2006. (Pubitemid 47131381)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 336-345
-
-
Ou, X.1
Boyer, W.F.2
McQueen, M.A.3
-
27
-
-
70350656962
-
NOX: Towards an operating system for networks
-
July
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, "NOX: Towards an Operating System for Networks," SIGCOMM Computer Comm. Rev., vol. 38, no. 3, pp. 105-110, July 2008.
-
(2008)
SIGCOMM Computer Comm. Rev
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
30
-
-
24944486135
-
Network security management using arp spoofing
-
K. Kwon, S. Ahn, and J. Chung, "Network Security Management Using ARP Spoofing," Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '04), pp. 142-149, 2004.
-
(2004)
Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '04)
, pp. 142-149
-
-
Kwon, K.1
Ahn, S.2
Chung, J.3
-
31
-
-
84883718687
-
-
"Metasploit," http://www.metasploit.com, 2012.
-
(2012)
Metasploit
-
-
-
32
-
-
84980396180
-
-
"Armitage," http://www.fastandeasyhacking.com, 2012.
-
(2012)
Armitage
-
-
|