-
1
-
-
84878341131
-
Cloud monitoring: A survey
-
Aceto, G. et al., 2013. Cloud monitoring: A survey. Computer Networks, 57(9), pp. 2093-2115.
-
(2013)
Computer Networks
, vol.57
, Issue.9
, pp. 2093-2115
-
-
Aceto, G.1
-
2
-
-
78049486291
-
Anomaly detection using the dempster-shafer method
-
Chen, Q. & Aickelin, U., 2006. Anomaly Detection Using the Dempster-Shafer Method. In DMIN. pp. 232-240.
-
(2006)
DMIN
, pp. 232-240
-
-
Chen, Q.1
Aickelin, U.2
-
3
-
-
84904179031
-
Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection
-
Fragkiadakis, A. G. et al., 2013. Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Journal of Wireless Communications and Mobile Computing, 13.
-
(2013)
Journal of Wireless Communications and Mobile Computing
, pp. 13
-
-
Fragkiadakis, A.G.1
-
5
-
-
49649115473
-
Opening the Pandora's box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks
-
Joseph, J. F. C. et al., 2008. Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks. Computer Communications, 31(14), pp. 3178-3189.
-
(2008)
Computer Communications
, vol.31
, Issue.14
, pp. 3178-3189
-
-
Joseph, J.F.C.1
-
6
-
-
84858158707
-
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
-
Khorshed, M. T., Ali, a. B. M. S. & Wasimi, S. a., 2012. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Computer Systems, 28(6), pp. 833-851.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.6
, pp. 833-851
-
-
Khorshed, M.T.1
Ali, A.B.M.S.2
Wasimi, S.A.3
-
7
-
-
2442465295
-
A taxonomy for software voting algorithms used in safety-critical systems
-
Latif-Shabgahi, G., Bass, J. M. & Bennett, S., 2004. A Taxonomy for Software Voting Algorithms Used in Safety-Critical Systems. IEEE Transactions on Reliability, 53(3), pp. 319-328.
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.3
, pp. 319-328
-
-
Latif-Shabgahi, G.1
Bass, J.M.2
Bennett, S.3
-
8
-
-
84893455200
-
Protecting critical infrastructure services in the cloud environment
-
ACPI, ed, Jyväskylä, Finland: ACI, UK
-
MacDermott, Á. et al., 2013. Protecting Critical Infrastructure Services in the Cloud Environment. In ACPI, ed. Proceedings of the 12th European Conference on Information Warfare and Security. Jyväskylä, Finland: ACI, UK, pp. 336-343.
-
(2013)
Proceedings of the 12th European Conference on Information Warfare and Security
, pp. 336-343
-
-
MacDermott, Á.1
-
12
-
-
84899805259
-
Resilient deployment of virtual network functions
-
Almaty
-
Scholler, M., Stiemerling, M. & Ripke, A., 2013. Resilient deployment of virtual network functions. In 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). Almaty, pp. 208-214.
-
(2013)
5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
, pp. 208-214
-
-
Scholler, M.1
Stiemerling, M.2
Ripke, A.3
-
13
-
-
84940726498
-
Operation, management, security and sustainability for cloud computing
-
Westphall, C. B. et al., 2014. Operation, Management, Security and Sustainability for Cloud Computing. Information Systems, 13, pp. 30-50.
-
(2014)
Information Systems
, vol.13
, pp. 30-50
-
-
Westphall, C.B.1
|