-
1
-
-
84916918767
-
A survey of information security incident handling in the cloud
-
Ab Rahman, N.H., Choo, K.-K.R., A survey of information security incident handling in the cloud. Comput. Secur. 49 (2015), 45–69.
-
(2015)
Comput. Secur.
, vol.49
, pp. 45-69
-
-
Ab Rahman, N.H.1
Choo, K.-K.R.2
-
2
-
-
84979201363
-
Authentication in mobile cloud computing: a survey
-
Alizadeh, M., et al. Authentication in mobile cloud computing: a survey. J. Netw. Comput. Appl., 2015.
-
(2015)
J. Netw. Comput. Appl.
-
-
Alizadeh, M.1
-
3
-
-
84888390301
-
A survey of phishing email filtering techniques
-
Almomani, A., et al. A survey of phishing email filtering techniques. Commun. Surv. Tutor. IEEE 15:4 (2013), 2070–2090.
-
(2013)
Commun. Surv. Tutor. IEEE
, vol.15
, Issue.4
, pp. 2070-2090
-
-
Almomani, A.1
-
4
-
-
84902652343
-
An intelligent intrusion detection system for cloud computing (SIDSCC)
-
In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE.
-
Alqahtani, S.M., Balushi, M.A. and John, R., 2014. An intelligent intrusion detection system for cloud computing (SIDSCC). In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE.
-
(2014)
-
-
Alqahtani, S.M.1
Balushi, M.A.2
John, R.3
-
5
-
-
84902682778
-
-
An intelligent intrusion prevention system for cloud computing (SIPSCC). In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE.
-
Alqahtani, S.M., Balushi, M.A. John, R., 2014. An intelligent intrusion prevention system for cloud computing (SIPSCC). In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE.
-
(2014)
-
-
Alqahtani, S.M.1
Balushi, M.A.2
John, R.3
-
6
-
-
84856080479
-
MCDB: Using Multi-clouds to Ensure Security in Cloud Computing
-
In: Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE.
-
AlZain, M.A., Soh, B., Pardede, E., 2011. MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. In: Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE.
-
(2011)
-
-
AlZain, M.A.1
Soh, B.2
Pardede, E.3
-
7
-
-
84879853167
-
A packet marking approach to protect cloud environment against DDoS attacks
-
In: Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (ICICES), IEEE.
-
Anitha, E., Malliga, S., 2013. A packet marking approach to protect cloud environment against DDoS attacks. In: Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (ICICES), IEEE.
-
(2013)
-
-
Anitha, E.1
Malliga, S.2
-
8
-
-
84983530202
-
Virtualization in intrusion detection systems: a study on different approaches for cloud computing environments
-
Araújo, J.D., Abdelouahab, Z., Virtualization in intrusion detection systems: a study on different approaches for cloud computing environments. IJCSNS, 12(11), 2012, 10.
-
(2012)
IJCSNS
, vol.12
, Issue.11
, pp. 10
-
-
Araújo, J.D.1
Abdelouahab, Z.2
-
9
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., et al. A view of cloud computing. Commun. ACM 53:4 (2010), 50–58.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
-
10
-
-
84870672469
-
An abstract model for integrated intrusion detection and severity analysis for clouds
-
Arshad, J., Townend, P., Xu, J., An abstract model for integrated intrusion detection and severity analysis for clouds. Int. J. Cloud Appl. Comput. (IJCAC) 1:1 (2011), 1–16.
-
(2011)
Int. J. Cloud Appl. Comput. (IJCAC)
, vol.1
, Issue.1
, pp. 1-16
-
-
Arshad, J.1
Townend, P.2
Xu, J.3
-
11
-
-
84892543507
-
Cloud based emails boundaries and vulnerabilities
-
In: Proceedings of the Science and Information Conference (SAI), 2013. IEEE.
-
Ayodele, T. and Adeegbe, D., 2013. Cloud based emails boundaries and vulnerabilities. In: Proceedings of the Science and Information Conference (SAI), 2013. IEEE.
-
(2013)
-
-
Ayodele, T.1
Adeegbe, D.2
-
12
-
-
77957936209
-
-
Multi-tenant SOA middleware for cloud computing. In: Proceedings of the Cloud Computing (Cloud), 2010 IEEE 3rd International Conference on, 2010. IEEE.
-
Azeez, A., et al., 2010 Multi-tenant SOA middleware for cloud computing. In: Proceedings of the Cloud Computing (Cloud), 2010 IEEE 3rd International Conference on, 2010. IEEE.
-
(2010)
-
-
Azeez, A.1
-
13
-
-
77952344255
-
Securing cloud from ddos attacks using intrusion detection system in virtual machine
-
In: Proceedings of the Communication Software and Networks, 2010. ICCSN'10. Second International Conference on, 2010. IEEE.
-
Bakshi, A., Yogesh, B., 2010. Securing cloud from ddos attacks using intrusion detection system in virtual machine. In: Proceedings of the Communication Software and Networks, 2010. ICCSN'10. Second International Conference on, 2010. IEEE.
-
(2010)
-
-
Bakshi, A.1
Yogesh, B.2
-
14
-
-
84983525976
-
-
Cloud computing security case studies and research. In: Proceedings of the World Congress on Engineering. 2013.
-
Barron, C., H., Yu, Zhan, J., 2012. Cloud computing security case studies and research. In: Proceedings of the World Congress on Engineering. 2013.
-
(2012)
-
-
Barron, C.1
Yu, H.2
Zhan, J.3
-
15
-
-
84983566837
-
-
A survey on security issues in cloud computing. arXiv preprint arXiv:1109.5388, 2011
-
Bhadauria, R., et al., 2011. A survey on security issues in cloud computing. arXiv preprint arXiv:1109.5388, 2011.
-
(2011)
-
-
Bhadauria, R.1
-
16
-
-
84923230964
-
Survey on security issues in cloud computing and associated mitigation techniques
-
arXiv preprint arXiv:1204.0764, 2012.
-
Bhadauria, R., Sanyal, S., 2012. Survey on security issues in cloud computing and associated mitigation techniques. arXiv preprint arXiv:1204.0764, 2012.
-
(2012)
-
-
Bhadauria, R.1
Sanyal, S.2
-
17
-
-
80051513757
-
-
Collabra: a xen hypervisor based collaborative intrusion detection system. In: Proceedings of the Information Technology: New Generations (ITNG), 2011 Eighth International Conference on, 2011. IEEE.
-
Bharadwaja, S., et al., 2011. Collabra: a xen hypervisor based collaborative intrusion detection system. In: Proceedings of the Information Technology: New Generations (ITNG), 2011 Eighth International Conference on, 2011. IEEE.
-
(2011)
-
-
Bharadwaja, S.1
-
18
-
-
84872558353
-
-
Cloud computing: security challenges. In: Proceedings of the Information Science and Technology (CIST), 2012 Colloquium in. 2012. IEEE.
-
Bouayad, A., et al., 2012. Cloud computing: security challenges. In: Proceedings of the Information Science and Technology (CIST), 2012 Colloquium in. 2012. IEEE.
-
(2012)
-
-
Bouayad, A.1
-
19
-
-
84872351013
-
-
Enforcing trust-based intrusion detection in cloud computing using algebraic methods. In: Proceedings of the Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on. IEEE.
-
Bradai, A., Afifi, H., Enforcing trust-based intrusion detection in cloud computing using algebraic methods. In: Proceedings of the Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on. 2012. IEEE.
-
(2012)
-
-
Bradai, A.1
Afifi, H.2
-
20
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing v2.1
-
Brunette, G., Mogull, R., Security guidance for critical areas of focus in cloud computing v2.1. Cloud Secur. Alliance, 2009, 1–76.
-
(2009)
Cloud Secur. Alliance
, pp. 1-76
-
-
Brunette, G.1
Mogull, R.2
-
21
-
-
84983554092
-
Virtualization System Security
-
IBM
-
Bryan Williams, T.C., Virtualization System Security. 2010, IBM.
-
(2010)
-
-
Bryan Williams, T.C.1
-
22
-
-
84876261368
-
Cloud computing-based forensic analysis for collaborative network security management system
-
Chen, Z., et al. Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua Sci. Technol. 18:1 (2013), 40–50.
-
(2013)
Tsinghua Sci. Technol.
, vol.18
, Issue.1
, pp. 40-50
-
-
Chen, Z.1
-
23
-
-
84856113439
-
-
CBF: A packet filtering method for DDoS attack defense in cloud environment. In: Proceedings of the Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on, 2011. IEEE.
-
Chen, Q., et al., 2011. CBF: A packet filtering method for DDoS attack defense in cloud environment. In: Proceedings of the Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on, 2011. IEEE.
-
(2011)
-
-
Chen, Q.1
-
24
-
-
84870803934
-
Detecting and mitigating HX-DoS attacks against cloud web services
-
In: Proceedings of the Network-Based Information Systems (NBiS), 2012 15th International Conference on, 2012. IEEE.
-
Chonka, A., Abawajy, J., 2012. Detecting and mitigating HX-DoS attacks against cloud web services. In: Proceedings of the Network-Based Information Systems (NBiS), 2012 15th International Conference on, 2012. IEEE.
-
(2012)
-
-
Chonka, A.1
Abawajy, J.2
-
25
-
-
84897585209
-
NICE: Network intrusion detection and countermeasure selection in virtual network systems
-
Chung, C.-J., et al. NICE: Network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secur. Comput., 2013, 1.
-
(2013)
IEEE Trans. Dependable Secur. Comput.
, pp. 1
-
-
Chung, C.-J.1
-
26
-
-
84929118270
-
SaaS Security and privacy
-
Corporation, P.S., 2008. SaaS Security and privacy.
-
(2008)
-
-
Corporation, P.S.1
-
27
-
-
84983488001
-
-
Council, S.-a.-a.-S.E., Software-as-a-Service; A Comprehensive Look at the Total Cost of Ownership of Software Applications.
-
Council, S.-a.-a.-S.E., 2006. Software-as-a-Service; A Comprehensive Look at the Total Cost of Ownership of Software Applications.
-
(2006)
-
-
-
28
-
-
77949590054
-
Distributed intrusion detection in clouds using mobile agents
-
In: Proceedings of the Advanced Engineering Computing and Applications in Sciences, 2009. ADVCOMP'09. Third International Conference on, 2009. IEEE.
-
Dastjerdi, A.V., Bakar, K.A., Tabatabaei, S.G.H., 2009. Distributed intrusion detection in clouds using mobile agents. In: Proceedings of the Advanced Engineering Computing and Applications in Sciences, 2009. ADVCOMP'09. Third International Conference on, 2009. IEEE.
-
(2009)
-
-
Dastjerdi, A.V.1
Bakar, K.A.2
Tabatabaei, S.G.H.3
-
29
-
-
77953172125
-
-
Infrastructure as a service security: Challenges and, solutions. In: Proceedings of the Informatics and Systems (INFOS), 2010 The 7th International Conference on. 2010. IEEE.
-
Dawoud, W., TakounaI., I., Meinel, C., 2010. Infrastructure as a service security: Challenges and, solutions. In: Proceedings of the Informatics and Systems (INFOS), 2010 The 7th International Conference on. 2010. IEEE.
-
(2010)
-
-
Dawoud, W.1
TakounaI, I.2
Meinel, C.3
-
30
-
-
84860629853
-
Multi-level authentication technique for accessing cloud services
-
In: Proceedings of the Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012. IEEE.
-
Dinesha, H., Agrawal, V., 2012. Multi-level authentication technique for accessing cloud services. In: Proceedings of the Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012. IEEE.
-
(2012)
-
-
Dinesha, H.1
Agrawal, V.2
-
31
-
-
84869391331
-
-
Return-oriented programming attack on the Xen hypervisor. In: Proceedings of the Availability, Reliability and Security (ARES), 2012 Seventh International Conference on, 2012. IEEE.
-
Ding, B., et al., 2012. Return-oriented programming attack on the Xen hypervisor. In: Proceedings of the Availability, Reliability and Security (ARES), 2012 Seventh International Conference on, 2012. IEEE.
-
(2012)
-
-
Ding, B.1
-
32
-
-
84893512235
-
-
Cloud Computing: Insider Attacks on Virtual Machines during Migration. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, 2013. IEEE.
-
Duncan, A., et al., 2013. Cloud Computing: Insider Attacks on Virtual Machines during Migration. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, 2013. IEEE.
-
(2013)
-
-
Duncan, A.1
-
33
-
-
84868152765
-
Insider attacks in cloud computing
-
In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. 2012. IEEE.
-
Duncan, A.J., Creese, S., Goldsmith, M., 2012. Insider attacks in cloud computing. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. 2012. IEEE.
-
(2012)
-
-
Duncan, A.J.1
Creese, S.2
Goldsmith, M.3
-
34
-
-
84867268908
-
Cloud based content fetching: Using cloud infrastructure to obfuscate phishing scam analysis
-
In: Proceedings of the Services (SERVICES), 2012 IEEE Eighth World Congress on. 2012. IEEE.
-
Ferguson, E., Weber, J., Hasan, R., 2012. Cloud based content fetching: Using cloud infrastructure to obfuscate phishing scam analysis. In: Proceedings of the Services (SERVICES), 2012 IEEE Eighth World Congress on. 2012. IEEE.
-
(2012)
-
-
Ferguson, E.1
Weber, J.2
Hasan, R.3
-
35
-
-
84983474163
-
FireHost
-
Cross-Site Scripting Attacks Up 160% in Final Quarter of 2012; Available from:.
-
FireHost, 2012. Cross-Site Scripting Attacks Up 160% in Final Quarter of 2012; Available from: 〈http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012〉.
-
(2012)
-
-
-
36
-
-
84901446600
-
A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
-
Gani, A., et al. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. J. Netw. Comput. Appl. 43 (2014), 84–102.
-
(2014)
J. Netw. Comput. Appl.
, vol.43
, pp. 84-102
-
-
Gani, A.1
-
37
-
-
78650882184
-
Terra: A Virtual Machine-based Platform For Trusted Computing
-
ACM
-
Garfinkel, T., et al. Terra: A Virtual Machine-based Platform For Trusted Computing. ACM SIGOPS Operating Systems Review, 2003, ACM,.
-
(2003)
ACM SIGOPS Operating Systems Review
-
-
Garfinkel, T.1
-
38
-
-
49049106371
-
Anti-DDoS Virtualized Operating System
-
In: Proceedings of the Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, 2008. IEEE.
-
Garg, S., Saran, H., 2008. Anti-DDoS Virtualized Operating System. In: Proceedings of the Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, 2008. IEEE.
-
(2008)
-
-
Garg, S.1
Saran, H.2
-
39
-
-
84897712723
-
A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
-
In: Proceedings of the Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on, 2013. IEEE.
-
Godfrey, M. and Zulkernine, M., 2013. A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud. In: Proceedings of the Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on, 2013. IEEE.
-
(2013)
-
-
Godfrey, M.1
Zulkernine, M.2
-
40
-
-
84983555194
-
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
-
arXiv preprint arXiv:1306.2477, 2013.
-
Grispos, G., Glisson, W.B., Storer T., 2013. Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization. arXiv preprint arXiv:1306.2477, 2013.
-
(2013)
-
-
Grispos, G.1
Glisson, W.B.2
Storer, T.3
-
41
-
-
78149324322
-
A CP intrusion detection strategy on cloud computing
-
In: Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09). 2009.
-
Guan, Y. and Bao, J., 2009. A CP intrusion detection strategy on cloud computing. In: Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09). 2009.
-
(2009)
-
-
Guan, Y.1
Bao, J.2
-
42
-
-
84983548173
-
-
A fingerprinting system calls approach for intrusion detection in a cloud environment. In: CASoN.
-
Gupta, S., et al., 2012. A fingerprinting system calls approach for intrusion detection in a cloud environment. In: CASoN.
-
(2012)
-
-
Gupta, S.1
-
43
-
-
84870697197
-
Managing intrusion detection as a service in cloud networks
-
Hamad, H., Al-Hoby, M., Managing intrusion detection as a service in cloud networks. Int. J. Comput. Appl. 41:1 (2012), 35–40.
-
(2012)
Int. J. Comput. Appl.
, vol.41
, Issue.1
, pp. 35-40
-
-
Hamad, H.1
Al-Hoby, M.2
-
44
-
-
84866927237
-
Security of cloud computing, storage, and networking
-
In: Proceedings of the Collaboration Technologies and Systems (CTS), 2012 International Conference on, 2012. IEEE.
-
Hamdi, M., 2012. Security of cloud computing, storage, and networking. In: Proceedings of the Collaboration Technologies and Systems (CTS), 2012 International Conference on, 2012. IEEE.
-
(2012)
-
-
Hamdi, M.1
-
45
-
-
78650053109
-
Side channels in cloud services: deduplication in cloud storage
-
Harnik, D., Pinkas, B., Shulman-Peleg, A., Side channels in cloud services: deduplication in cloud storage. Secur. Priv. IEEE 8:6 (2010), 40–47.
-
(2010)
Secur. Priv. IEEE
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
46
-
-
80052184968
-
A cloud-based intrusion detection and response system for mobile phones
-
In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on, 2011. IEEE.
-
Houmansadr, A., Zonouz, S.A., Berthier, R., 2011. A cloud-based intrusion detection and response system for mobile phones. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on, 2011. IEEE.
-
(2011)
-
-
Houmansadr, A.1
Zonouz, S.A.2
Berthier, R.3
-
47
-
-
81055155507
-
-
Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model. In: Proceedings of the Network and System Security (NSS), 2011 5th International Conference on. 2011. IEEE.
-
Ibrahim, A.S., et al., 2011. Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model. In: Proceedings of the Network and System Security (NSS), 2011 5th International Conference on. 2011. IEEE.
-
(2011)
-
-
Ibrahim, A.S.1
-
48
-
-
74349113474
-
-
On technical security issues in cloud computing. In: Proceedings of the Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, 2009. IEEE.
-
Jensen, M., et al., 2009. On technical security issues in cloud computing. In: Proceedings of the Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, 2009. IEEE.
-
(2009)
-
-
Jensen, M.1
-
49
-
-
79955703103
-
The research and design of intelligent IPS model based on dynamic cloud firewall linkage
-
Jia, T., Wang, X., The research and design of intelligent IPS model based on dynamic cloud firewall linkage. Int. J. Digit. Content Technol. Appl. 5:3 (2011), 304–309.
-
(2011)
Int. J. Digit. Content Technol. Appl.
, vol.5
, Issue.3
, pp. 304-309
-
-
Jia, T.1
Wang, X.2
-
50
-
-
85043571633
-
-
Chapter 3 - CATRA: Conceptual cloud attack taxonomy and risk assessment framework, in The Cloud Security Ecosystem. Syngress: Boston. pp. 37–81.
-
Juliadotter, N.V., Choo, K.-K.R., Chapter 3 - CATRA: Conceptual cloud attack taxonomy and risk assessment framework, in The Cloud Security Ecosystem. 2015, Syngress: Boston. pp. 37–81.
-
(2015)
-
-
Juliadotter, N.V.1
Choo, K.-K.R.2
-
51
-
-
78751480363
-
Identity-based authentication in cloud storage sharing
-
In: Proceedings of the Multimedia Information Networking and Security (MINES), 2010 International Conference on, 2010. IEEE.
-
Kang, L., Zhang, X., 2010. Identity-based authentication in cloud storage sharing. In: Proceedings of the Multimedia Information Networking and Security (MINES), 2010 International Conference on, 2010. IEEE.
-
(2010)
-
-
Kang, L.1
Zhang, X.2
-
52
-
-
84868283421
-
A Filter tree approach to protect cloud computing against XML DDoS and HTTP DDoS attack
-
Springer
-
Karnwal, T., Thandapanii, S., Gnanasekaran, A., A Filter tree approach to protect cloud computing against XML DDoS and HTTP DDoS attack. Intelligent Informatics, 2013, Springer, 459–469.
-
(2013)
Intelligent Informatics
, pp. 459-469
-
-
Karnwal, T.1
Thandapanii, S.2
Gnanasekaran, A.3
-
53
-
-
84904611020
-
Securing cloud servers against flooding based DDoS attacks
-
Katkamwar, N.S., Puranik, A.G., Deshpande, P., Securing cloud servers against flooding based DDoS attacks. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 1:3 (2012), 50–55.
-
(2012)
Int. J. Appl. Innov. Eng. Manag. (IJAIEM)
, vol.1
, Issue.3
, pp. 50-55
-
-
Katkamwar, N.S.1
Puranik, A.G.2
Deshpande, P.3
-
54
-
-
84904646449
-
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
-
2014
-
Khan, S., et al. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing. Sci. World J., 2014 2014.
-
(2014)
Sci. World J.
-
-
Khan, S.1
-
55
-
-
84978319091
-
Network forensics: review, taxonomy, and open challenges
-
Khan, S., et al. Network forensics: review, taxonomy, and open challenges. J. Netw. Comput. Appl. 66 (2016), 214–235.
-
(2016)
J. Netw. Comput. Appl.
, vol.66
, pp. 214-235
-
-
Khan, S.1
-
56
-
-
84971268778
-
Cloud log forensics: foundations, state of the art, and future directions
-
Khan, S., et al. Cloud log forensics: foundations, state of the art, and future directions. ACM Comput. Surv. (CSUR), 49(1), 2016, 7.
-
(2016)
ACM Comput. Surv. (CSUR)
, vol.49
, Issue.1
, pp. 7
-
-
Khan, S.1
-
57
-
-
84925944148
-
-
Forensic challenges in mobile cloud computing. In: Proceedings of the Computer, Communications, and Control Technology (I4CT), 2014 International Conference on. 2014. IEEE.
-
Khan, S., et al. Forensic challenges in mobile cloud computing. In: Proceedings of the Computer, Communications, and Control Technology (I4CT), 2014 International Conference on. 2014. IEEE.
-
-
-
Khan, S.1
-
58
-
-
84959484133
-
-
SIDNFF: Source identification network forensics framework for cloud computing. In: Proceedings of the Consumer Electronics-Taiwan (ICCE-TW), 2015 IEEE International Conference on, 2015. IEEE.
-
Khan, S., et al., 2015. SIDNFF: Source identification network forensics framework for cloud computing. In: Proceedings of the Consumer Electronics-Taiwan (ICCE-TW), 2015 IEEE International Conference on, 2015. IEEE.
-
(2015)
-
-
Khan, S.1
-
59
-
-
84888328281
-
Phishing detection: a literature survey
-
Khonji, M., Iraqi, Y., Jones, A., Phishing detection: a literature survey. Commun. Surv. Tutor. IEEE 15:4 (2013), 2091–2121.
-
(2013)
Commun. Surv. Tutor. IEEE
, vol.15
, Issue.4
, pp. 2091-2121
-
-
Khonji, M.1
Iraqi, Y.2
Jones, A.3
-
60
-
-
84856142134
-
-
Monitoring insiders activities in cloud computing using rule based learning. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. 2011. IEEE.
-
Khorshed, M.T., Ali, A.S. Wasimi, S.A., 2011. Monitoring insiders activities in cloud computing using rule based learning. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. 2011. IEEE.
-
(2011)
-
-
Khorshed, M.T.1
Ali, A.S.W.2
-
61
-
-
84874470449
-
A cloud-based intrusion detection system for Android smartphones
-
In: Proceedings of the International conference on radar, communication and computing, India. 2012.
-
Khune, R., Thangakumar, J., 2012. A cloud-based intrusion detection system for Android smartphones. In: Proceedings of the International conference on radar, communication and computing, India. 2012.
-
(2012)
-
-
Khune, R.1
Thangakumar, J.2
-
62
-
-
84869744639
-
A self-protection mechanism against stepping-stone attacks, for IaaS clouds
-
In: Proceedings of the Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. 2012. IEEE.
-
Kourai, K., Azumi, T., Chiba, S., 2012. A self-protection mechanism against stepping-stone attacks, for IaaS clouds. In: Proceedings of the Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. 2012. IEEE.
-
(2012)
-
-
Kourai, K.1
Azumi, T.2
Chiba, S.3
-
63
-
-
84872111291
-
Self-similarity based lightweight intrusion detection method for cloud computing
-
Springer
-
Kwon, H., et al. Self-similarity based lightweight intrusion detection method for cloud computing. Intelligent Information and Database Systems, 2011, Springer, 353–362.
-
(2011)
Intelligent Information and Database Systems
, pp. 353-362
-
-
Kwon, H.1
-
64
-
-
79955677448
-
-
Multi-level intrusion detection system and log management in cloud computing. In: Proceedings of the Advanced Communication Technology (ICACT), 2011 13th International Conference on, 2011. IEEE.
-
Lee, J.-H., et al., 2011. Multi-level intrusion detection system and log management in cloud computing. In: Proceedings of the Advanced Communication Technology (ICACT), 2011 13th International Conference on, 2011. IEEE.
-
(2011)
-
-
Lee, J.-H.1
-
65
-
-
80053019503
-
-
LARX: Large-scale anti-phishing by retrospective data-exploring based on a cloud computing platform. In: Proceedings of the Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on, 2011. IEEE.
-
Li, T., et al., 2011. LARX: Large-scale anti-phishing by retrospective data-exploring based on a cloud computing platform. In: Proceedings of the Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on, 2011. IEEE.
-
(2011)
-
-
Li, T.1
-
66
-
-
84983509611
-
-
A detection scheme for flooding attack on application layer based on semantic concept. In: Proceedings of the Computer Symposium (ICS), 2010 International. 2010. IEEE.
-
Lin, C.-H., et al., 2010. A detection scheme for flooding attack on application layer based on semantic concept. In: Proceedings of the Computer Symposium (ICS), 2010 International. 2010. IEEE.
-
(2010)
-
-
Lin, C.-H.1
-
67
-
-
84866403148
-
Traceback Attacks in Cloud–Pebbletrace Botnet
-
In: Proceedings of the Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
-
Lin, W. and Lee, D., 2012. Traceback Attacks in Cloud–Pebbletrace Botnet. In: Proceedings of the Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
-
(2012)
-
-
Lin, W.1
Lee, D.2
-
68
-
-
84918562009
-
Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions
-
Liu, J., et al. Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions. J. Netw. Comput. Appl. 48 (2015), 99–117.
-
(2015)
J. Netw. Comput. Appl.
, vol.48
, pp. 99-117
-
-
Liu, J.1
-
69
-
-
64549154025
-
-
The design and application of Xen-based host system firewall and its extension. In: Proceedings of the Electronic Computer Technology, 2009 International Conference on. 2009. IEEE.
-
Liu, F., et al., 2009. The design and application of Xen-based host system firewall and its extension. In: Proceedings of the Electronic Computer Technology, 2009 International Conference on. 2009. IEEE.
-
(2009)
-
-
Liu, F.1
-
70
-
-
78649815408
-
-
A cooperative intrusion detection system framework for cloud computing networks. In: Proceedings of the Parallel Processing Workshops (ICPPW), 2010 39th International Conference on. IEEE.
-
Lo, C.-C., Huang, C.-C., Ku., J. A cooperative intrusion detection system framework for cloud computing networks. In: Proceedings of the Parallel Processing Workshops (ICPPW), 2010 39th International Conference on. 2010. IEEE.
-
(2010)
-
-
Lo, C.-C.1
Huang, C.-C.2
Ku, J.3
-
71
-
-
84888058980
-
SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud
-
in Services (SERVICES), 203 IEEE Ninth World Congress on, 2013. IEEE.
-
Lomotey, R.K., Deters, R., 2013. SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud. in Services (SERVICES), 203 IEEE Ninth World Congress on, 2013. IEEE.
-
(2013)
-
-
Lomotey, R.K.1
Deters, R.2
-
72
-
-
84899069262
-
Resource management for Infrastructure as a Service (IaaS) in cloud computing: a survey
-
Manvi, S.S., Shyam, G.K., Resource management for Infrastructure as a Service (IaaS) in cloud computing: a survey. J. Netw. Comput. Appl. 41 (2014), 424–440.
-
(2014)
J. Netw. Comput. Appl.
, vol.41
, pp. 424-440
-
-
Manvi, S.S.1
Shyam, G.K.2
-
73
-
-
78349296456
-
Integrating a network ids into an open source cloud computing environment
-
In: Proceedings of the Information Assurance and Security (IAS), 2010 Sixth International Conference on. 2010. IEEE.
-
Mazzariello, C., Bifulco, R., Canonico, R., 2010. Integrating a network ids into an open source cloud computing environment. In: Proceedings of the Information Assurance and Security (IAS), 2010 Sixth International Conference on. 2010. IEEE.
-
(2010)
-
-
Mazzariello, C.1
Bifulco, R.2
Canonico, R.3
-
74
-
-
84903952214
-
Design of cloud-based parallel exclusive signature matching model in intrusion detection
-
In: Proceedings of the High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on. 2013. IEEE.
-
Meng, Y., Li, W., Kwok, L.-F., 2013. Design of cloud-based parallel exclusive signature matching model in intrusion detection. In: Proceedings of the High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on. 2013. IEEE.
-
(2013)
-
-
Meng, Y.1
Li, W.2
Kwok, L.-F.3
-
75
-
-
84886723209
-
A survey on security issues and solutions at different layers of cloud computing
-
Modi, C., et al. A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63:2 (2013), 561–592.
-
(2013)
J. Supercomput.
, vol.63
, Issue.2
, pp. 561-592
-
-
Modi, C.1
-
76
-
-
84983500615
-
-
A collaborative intrusion detection and prevention system in cloud computing. In: Proceedings of the AFRICON, 2013. 2013. IEEE.
-
Mohamed, H., et al., 2013. A collaborative intrusion detection and prevention system in cloud computing. In: Proceedings of the AFRICON, 2013. 2013. IEEE.
-
(2013)
-
-
Mohamed, H.1
-
77
-
-
85088779495
-
Silverline: data and network isolation for cloud services
-
Mundada, Y., Ramachandran, A., Feamster, N., Silverline: data and network isolation for cloud services. Proc HotCloud, 2011.
-
(2011)
Proc HotCloud
-
-
Mundada, Y.1
Ramachandran, A.2
Feamster, N.3
-
78
-
-
84874642710
-
UNWRAP: An approach on wrapping-attack tolerant SOAP messages
-
In: Proceedings of the Cloud and Green Computing (CGC), 2012 Second International Conference on. 2012. IEEE.
-
Nasridinov, A., Byun, J.-Y., Park, Y.-H., 2012. UNWRAP: An approach on wrapping-attack tolerant SOAP messages. In: Proceedings of the Cloud and Green Computing (CGC), 2012 Second International Conference on. 2012. IEEE.
-
(2012)
-
-
Nasridinov, A.1
Byun, J.-Y.2
Park, Y.-H.3
-
79
-
-
84970003207
-
Trustworthy processing of healthcare big data in hybrid clouds
-
Nepal, S., Ranjan, R., Choo, K.-K.R., Trustworthy processing of healthcare big data in hybrid clouds. Cloud Comput. IEEE 2:2 (2015), 78–84.
-
(2015)
Cloud Comput. IEEE
, vol.2
, Issue.2
, pp. 78-84
-
-
Nepal, S.1
Ranjan, R.2
Choo, K.-K.R.3
-
80
-
-
84899531027
-
Hypervisor-based cloud intrusion detection system
-
In: Proceedings of the Computing, Networking and Communications (ICNC), 2014 International Conference on. 2014. IEEE.
-
Nikolai, J., Wang, Y., 2014. Hypervisor-based cloud intrusion detection system. In: Proceedings of the Computing, Networking and Communications (ICNC), 2014 International Conference on. 2014. IEEE.
-
(2014)
-
-
Nikolai, J.1
Wang, Y.2
-
81
-
-
84896479235
-
Detecting a malicious insider in the cloud environment using sequential rule mining
-
In: Proceedings of the Adaptive Science and Technology (ICAST), 2013 International Conference on. 2013. IEEE.
-
Nkosi, L., Tarwireyi, P., Adigun, M.O., 2013. Detecting a malicious insider in the cloud environment using sequential rule mining. In: Proceedings of the Adaptive Science and Technology (ICAST), 2013 International Conference on. 2013. IEEE.
-
(2013)
-
-
Nkosi, L.1
Tarwireyi, P.2
Adigun, M.O.3
-
82
-
-
84890819793
-
Insider threat detection model for the cloud
-
In: Proceedings of the Information Security for South Africa, 2013. IEEE.
-
Nkosi, L., Tarwireyi, P., Adigun, M.O., 2013. Insider threat detection model for the cloud. In: Proceedings of the Information Security for South Africa, 2013. IEEE.
-
(2013)
-
-
Nkosi, L.1
Tarwireyi, P.2
Adigun, M.O.3
-
83
-
-
84893811224
-
A circular chain intrusion detection for cloud computing based on improved AdjointVM approach
-
In: Proceedings of the Computational Intelligence and Informatics (CINTI), 2013 IEEE 14th International Symposium on. 2013. IEEE.
-
Oktay, U., Aydin, M.A., Sahingoz, O.K., 2013. A circular chain intrusion detection for cloud computing based on improved AdjointVM approach. In: Proceedings of the Computational Intelligence and Informatics (CINTI), 2013 IEEE 14th International Symposium on. 2013. IEEE.
-
(2013)
-
-
Oktay, U.1
Aydin, M.A.2
Sahingoz, O.K.3
-
84
-
-
84882276491
-
Proxy Network Intrusion Detection System for cloud computing
-
In: Proceedings of the Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on. 2013. IEEE.
-
Oktay, U., Sahingoz, O., 2013. Proxy Network Intrusion Detection System for cloud computing. In: Proceedings of the Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on. 2013. IEEE.
-
(2013)
-
-
Oktay, U.1
Sahingoz, O.2
-
85
-
-
51849133701
-
-
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. In: Proceedings of the Network Operations and Management Symposium, 2008. NOMS 2008. IEEE. 2008. IEEE.
-
Oliveira, D., et al., 2008. Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. In: Proceedings of the Network Operations and Management Symposium, 2008. NOMS 2008. IEEE. 2008. IEEE.
-
(2008)
-
-
Oliveira, D.1
-
86
-
-
84956680241
-
Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud ddos mitigation framework
-
Osanaiye, O., Choo, K.-K.R., Dlodlo, M., Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud ddos mitigation framework. J. Netw. Comput. Appl., 2016.
-
(2016)
J. Netw. Comput. Appl.
-
-
Osanaiye, O.1
Choo, K.-K.R.2
Dlodlo, M.3
-
87
-
-
80054987410
-
A hypervisor for injecting scenario-based attack effects
-
In: Proceedings of the Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual. 2011. IEEE.
-
Oyama, Y., Hoshi, Y., 2011. A hypervisor for injecting scenario-based attack effects. In: Proceedings of the Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual. 2011. IEEE.
-
(2011)
-
-
Oyama, Y.1
Hoshi, Y.2
-
88
-
-
84870667876
-
An intrusion detection and prevention system in cloud computing: a systematic review
-
Patel, A., et al. An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36:1 (2013), 25–41.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.1
, pp. 25-41
-
-
Patel, A.1
-
89
-
-
34247563970
-
-
Aiding side-channel attacks on cryptographic software with satisfiability-based analysis. Very Large Scale Integr (VLSI) Syst, IEEE Transactions on 15, 4, pp. 465–470.
-
Potlapally, N.R., et al., 2007. Aiding side-channel attacks on cryptographic software with satisfiability-based analysis. Very Large Scale Integr (VLSI) Syst, IEEE Transactions on 15, 4, pp. 465–470.
-
(2007)
-
-
Potlapally, N.R.1
-
90
-
-
84951790264
-
Web application protection techniques: a taxonomy
-
Prokhorenko, V., Choo, K.-K.R., Ashman, H., Web application protection techniques: a taxonomy. J. Netw. Comput. Appl. 60 (2016), 95–112.
-
(2016)
J. Netw. Comput. Appl.
, vol.60
, pp. 95-112
-
-
Prokhorenko, V.1
Choo, K.-K.R.2
Ashman, H.3
-
91
-
-
84887901202
-
Cloud computing: network/security threats and countermeasures
-
Qaisar, S., Khawaja, K.F., Cloud computing: network/security threats and countermeasures. Interdiscip. J. Contemp. Res. Bus. 3:9 (2012), 1323–1329.
-
(2012)
Interdiscip. J. Contemp. Res. Bus.
, vol.3
, Issue.9
, pp. 1323-1329
-
-
Qaisar, S.1
Khawaja, K.F.2
-
92
-
-
84927804589
-
Sierpinski triangle based data center architecture in cloud computing
-
Qi, H., et al. Sierpinski triangle based data center architecture in cloud computing. J. Supercomput. 69:2 (2014), 887–907.
-
(2014)
J. Supercomput.
, vol.69
, Issue.2
, pp. 887-907
-
-
Qi, H.1
-
93
-
-
78249258944
-
A Survey on Virtual Machine Security
-
Helsinki University of Technology
-
Reuben, J.S., A Survey on Virtual Machine Security. 2007, Helsinki University of Technology,.
-
(2007)
-
-
Reuben, J.S.1
-
94
-
-
84857811225
-
Securing user authentication using single sign-on in Cloud Computing
-
In: Proceedings of the Engineering (NUiCONE), 2011 Nirma University International Conference on. 2011. IEEE.
-
Revar, A.G., Bhavsar, M.D., 2011. Securing user authentication using single sign-on in Cloud Computing. In: Proceedings of the Engineering (NUiCONE), 2011 Nirma University International Conference on. 2011. IEEE.
-
(2011)
-
-
Revar, A.G.1
Bhavsar, M.D.2
-
95
-
-
74049152260
-
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the Proceedings of the 16th ACM conference on Computer and communications security. 2009. ACM.
-
Ristenpart, T., et al., 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the Proceedings of the 16th ACM conference on Computer and communications security. 2009. ACM.
-
(2009)
-
-
Ristenpart, T.1
-
96
-
-
84881186992
-
-
Defense-in-depth against malicious insiders in the cloud. In: Proceedings of the Cloud Engineering (IC2E), 2013 IEEE International Conference on. 2013. IEEE.
-
Rocha, F., Gross, T., van Moorsel, A., 2013. Defense-in-depth against malicious insiders in the cloud. In: Proceedings of the Cloud Engineering (IC2E), 2013 IEEE International Conference on. 2013. IEEE.
-
(2013)
-
-
Rocha, F.1
Gross, T.2
van Moorsel, A.3
-
97
-
-
84855993467
-
Building safe PaaS clouds: a survey on security in multitenant software platforms
-
Rodero-Merino, L., et al. Building safe PaaS clouds: a survey on security in multitenant software platforms. Comput. Secur. 31:1 (2012), 96–108.
-
(2012)
Comput. Secur.
, vol.31
, Issue.1
, pp. 96-108
-
-
Rodero-Merino, L.1
-
98
-
-
74049138988
-
An extensible and virtualization-compatible IDS management architecture
-
In: Proceedings of the Information Assurance and Security, 2009. IAS'09. Fifth International Conference on. 2009. IEEE.
-
Roschke, S., Cheng, F., Meinel, C., 2009. An extensible and virtualization-compatible IDS management architecture. In: Proceedings of the Information Assurance and Security, 2009. IAS'09. Fifth International Conference on. 2009. IEEE.
-
(2009)
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
99
-
-
84884477675
-
-
Detecting VM Live Migration using a Hybrid External Approach. In: CLOSER. 2013.
-
S., Fiebig, et al., 2013. Detecting VM Live Migration using a Hybrid External Approach. In: CLOSER. 2013.
-
(2013)
-
-
Fiebig, S.1
-
100
-
-
80053143242
-
Virtualization-level security in cloud computing
-
In: Proceedings of the Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. 2011. IEEE.
-
Sabahi, F., 2011. Virtualization-level security in cloud computing. In: Proceedings of the Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. 2011. IEEE.
-
(2011)
-
-
Sabahi, F.1
-
101
-
-
84891058753
-
Designing a new E-Commerce authentication framework for a cloud-based environment
-
In: Proceedings of the Control and System Graduate Research Colloquium (ICSGRC), 2013 IEEE 4th. IEEE.
-
Sawesi, K.G.A., Saudi, M.M., Jali, M.Z., 2013. Designing a new E-Commerce authentication framework for a cloud-based environment. In: Proceedings of the Control and System Graduate Research Colloquium (ICSGRC), 2013 IEEE 4th. IEEE.
-
(2013)
-
-
Sawesi, K.G.A.1
Saudi, M.M.2
Jali, M.Z.3
-
102
-
-
84891937891
-
-
Detecting SOQL-injection vulnerabilities in sales force applications. In: Proceedings of the Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. 2013. IEEE.
-
Saxena, A., et al., 2013. Detecting SOQL-injection vulnerabilities in sales force applications. In: Proceedings of the Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. 2013. IEEE.
-
(2013)
-
-
Saxena, A.1
-
103
-
-
84870734121
-
Guide to Security For Full Virtualization Technologies
-
DIANE Publishing
-
Scarfone, K., Guide to Security For Full Virtualization Technologies. 2011, DIANE Publishing.
-
(2011)
-
-
Scarfone, K.1
-
104
-
-
84938597589
-
Trust model for measuring security strength of cloud computing service
-
Shaikh, R., Sasikumar, M., Trust model for measuring security strength of cloud computing service. Procedia Comput. Sci. 45 (2015), 380–389.
-
(2015)
Procedia Comput. Sci.
, vol.45
, pp. 380-389
-
-
Shaikh, R.1
Sasikumar, M.2
-
105
-
-
84949992494
-
Taxonomy of distributed denial of service mitigation approaches for cloud computing
-
Shameli-Sendi, A., et al. Taxonomy of distributed denial of service mitigation approaches for cloud computing. J. Netw. Comput. Appl. 58 (2015), 165–179.
-
(2015)
J. Netw. Comput. Appl.
, vol.58
, pp. 165-179
-
-
Shameli-Sendi, A.1
-
106
-
-
84866635199
-
Understanding the impact of denial of service attacks on virtual machines
-
In: Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service 2012 IEEE Press.
-
Shea, R., Liu, J., 2012. Understanding the impact of denial of service attacks on virtual machines. In: Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service 2012 IEEE Press.
-
(2012)
-
-
Shea, R.1
Liu, J.2
-
107
-
-
80052143494
-
-
Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on. 2011. IEEE.
-
Shi, J., et al., 2011. Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on. 2011. IEEE.
-
(2011)
-
-
Shi, J.1
-
108
-
-
84908200731
-
A study on the critical analysis of computational offloading frameworks for mobile cloud computing
-
Shiraz, M., et al. A study on the critical analysis of computational offloading frameworks for mobile cloud computing. J. Netw. Comput. Appl. 47 (2015), 47–60.
-
(2015)
J. Netw. Comput. Appl.
, vol.47
, pp. 47-60
-
-
Shiraz, M.1
-
109
-
-
84971301504
-
Cloud forensics: identifying the major issues and challenges
-
Springer
-
Simou, S., et al. Cloud forensics: identifying the major issues and challenges. Advanced Information Systems Engineering, 2014, Springer.
-
(2014)
Advanced Information Systems Engineering
-
-
Simou, S.1
-
110
-
-
84881250193
-
Oblivistore: high performance oblivious cloud storage
-
In: Proceedings of the Security and Privacy (SP), 2013 IEEE Symposium on. 2013. IEEE.
-
Stefanov, E., Shi, E., 2013. Oblivistore: high performance oblivious cloud storage. In: Proceedings of the Security and Privacy (SP), 2013 IEEE Symposium on. 2013. IEEE.
-
(2013)
-
-
Stefanov, E.1
Shi, E.2
-
111
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini, S., Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34:1 (2011), 1–11.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
112
-
-
84055200868
-
Surveying and analyzing security, privacy and trust issues in cloud computing environments
-
Sun, D., et al. Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Eng. 15 (2011), 2852–2856.
-
(2011)
Procedia Eng.
, vol.15
, pp. 2852-2856
-
-
Sun, D.1
-
113
-
-
84873855071
-
-
Model checking for the defense against cross-site scripting attacks. In: Proceedings of the Computer Science & Service System (CSSS), 2012 International Conference on. 2012. IEEE.
-
Sun, Y., He., D., 2012. Model checking for the defense against cross-site scripting attacks. In: Proceedings of the Computer Science & Service System (CSSS), 2012 International Conference on. 2012. IEEE.
-
(2012)
-
-
Sun, Y.1
He, D.2
-
114
-
-
84983493497
-
Security on cloud storage and IaaS, in Taiwan-Japan Workshop 2012/Nov/272012
-
Suzaki, K., 2012. Security on cloud storage and IaaS, in Taiwan-Japan Workshop 2012/Nov/272012.
-
(2012)
-
-
Suzaki, K.1
-
115
-
-
80755169480
-
-
Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the Proceedings of the 18th ACM conference on Computer and communications security. ACM.
-
Szefer, J., et al. Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the Proceedings of the 18th ACM conference on Computer and communications security. 2011. ACM.
-
(2011)
-
-
Szefer, J.1
-
116
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi, H., Joshi, J.B., Ahn, G.-J., Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 6 (2010), 24–31.
-
(2010)
IEEE Secur. Priv.
, vol.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.2
Ahn, G.-J.3
-
117
-
-
84983520009
-
Facebook users targeted by hackers in successful phishing attack, Available from:
-
Telegraph, T., 2009. Facebook users targeted by hackers in successful phishing attack, Available from: 〈http://www.telegraph.co.uk/technology/facebook/5326971/Facebook-users-targeted-by-hackers-in-successful-phishing-attack.html〉.
-
(2009)
-
-
Telegraph, T.1
-
118
-
-
84905817532
-
Interconnected cloud computing environments: Challenges, taxonomy, and survey
-
Toosi, A.N., Calheiros, R.N., Buyya, R., Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Comput. Surv. (CSUR), 47(1), 2014, 7.
-
(2014)
ACM Comput. Surv. (CSUR)
, vol.47
, Issue.1
, pp. 7
-
-
Toosi, A.N.1
Calheiros, R.N.2
Buyya, R.3
-
119
-
-
84856085485
-
-
Intrusion detection techniques for infrastructure as a service cloud. In: Proceedings of the Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on. 2011. IEEE.
-
Tupakula, U., Varadharajan, V., AkkuN., 2011. Intrusion detection techniques for infrastructure as a service cloud. In: Proceedings of the Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on. 2011. IEEE.
-
(2011)
-
-
Tupakula, U.1
Varadharajan, V.2
Akku, N.3
-
120
-
-
84983483477
-
Breakpoints: an analysis of potential hypervisor attack vectors
-
In: Proceedings of the Southeastcon, IEEE. 2013. IEEE.
-
Turnbull, L., Shropshire, J., 2013. Breakpoints: an analysis of potential hypervisor attack vectors. In: Proceedings of the Southeastcon, IEEE. 2013. IEEE.
-
(2013)
-
-
Turnbull, L.1
Shropshire, J.2
-
121
-
-
77954931494
-
Intrusion detection for grid and cloud computing
-
Vieira, K., et al. Intrusion detection for grid and cloud computing. IT Prof. 12:4 (2010), 38–43.
-
(2010)
IT Prof.
, vol.12
, Issue.4
, pp. 38-43
-
-
Vieira, K.1
-
122
-
-
84870354202
-
Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks
-
VivinSandar, S., Shenai, S., Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks. Int. J. Comput. Appl. 41:20 (2012), 11–16.
-
(2012)
Int. J. Comput. Appl.
, vol.41
, Issue.20
, pp. 11-16
-
-
VivinSandar, S.1
Shenai, S.2
-
124
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
In: Proceedings of the Security and Privacy (SP), 2010 IEEE Symposium on. 2010. IEEE.
-
Wang, Z., Jiang, X., 2010. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the Security and Privacy (SP), 2010 IEEE Symposium on. 2010. IEEE.
-
(2010)
-
-
Wang, Z.1
Jiang, X.2
-
125
-
-
84896317870
-
A survey on vehicular cloud computing
-
Whaiduzzaman, M., et al. A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40 (2014), 325–344.
-
(2014)
J. Netw. Comput. Appl.
, vol.40
, pp. 325-344
-
-
Whaiduzzaman, M.1
-
126
-
-
84880879632
-
-
Defending against VM rollback attack. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on. 2012. IEEE.
-
Xia, Y., et al., 2012. Defending against VM rollback attack. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on. 2012. IEEE.
-
(2012)
-
-
Xia, Y.1
-
127
-
-
84877272118
-
Security and privacy in cloud computing
-
Xiao, Z., Xiao, Y., Security and privacy in cloud computing. Commun. Surv. Tutor. IEEE 15:2 (2013), 843–859.
-
(2013)
Commun. Surv. Tutor. IEEE
, vol.15
, Issue.2
, pp. 843-859
-
-
Xiao, Z.1
Xiao, Y.2
-
128
-
-
84881348074
-
-
Cloud-based RFID authentication. In: Proceedings of the RFID (RFID), 2013 IEEE International Conference on. 2013. IEEE.
-
Xie, W., et al., 2013. Cloud-based RFID authentication. In: Proceedings of the RFID (RFID), 2013 IEEE International Conference on. 2013. IEEE.
-
(2013)
-
-
Xie, W.1
-
129
-
-
84983521122
-
-
CDN-on-Demand: An Affordable DDoS Defense via Untrusted Clouds.
-
Y., Gilad, et al., CDN-on-Demand: An Affordable DDoS Defense via Untrusted Clouds.
-
-
-
Gilad, Y.1
-
130
-
-
84867090258
-
-
Defense of DDoS attack for cloud computing. In: Proceedings of the Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on. 2012. IEEE.
-
Yang, L., et al., 2012. Defense of DDoS attack for cloud computing. In: Proceedings of the Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on. 2012. IEEE.
-
(2012)
-
-
Yang, L.1
-
131
-
-
78649280543
-
Malicious modification attacks by insiders in relational databases: prediction and prevention
-
In: Proceedings of the Social Computing (SocialCom), 2010 IEEE Second International Conference on. 2010. IEEE.
-
Yaseen, Q., Panda, B., 2010. Malicious modification attacks by insiders in relational databases: prediction and prevention. In: Proceedings of the Social Computing (SocialCom), 2010 IEEE Second International Conference on. 2010. IEEE.
-
(2010)
-
-
Yaseen, Q.1
Panda, B.2
-
132
-
-
84874587590
-
-
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Proceedings of the Cloud and Green Computing (CGC), 2012 s International Conference on. 2012. IEEE.
-
Yassin, A.A., et al., 2012. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Proceedings of the Cloud and Green Computing (CGC), 2012 s International Conference on. 2012. IEEE.
-
(2012)
-
-
Yassin, A.A.1
-
133
-
-
84866674011
-
-
A cloud-based intrusion detection service framework. In: Proceedings of the Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. 2012. IEEE.
-
Yassin, W., et al., 2012. A cloud-based intrusion detection service framework. In: Proceedings of the Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. 2012. IEEE.
-
(2012)
-
-
Yassin, W.1
-
134
-
-
84866348681
-
-
Security issues and solutions in cloud computing. In: Proceedings of the Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
-
You, P., et al., 2012. Security issues and solutions in cloud computing. In: Proceedings of the Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
-
(2012)
-
-
You, P.1
-
135
-
-
84876748582
-
An approach with two-stage mode to detect cache-based side channel attacks
-
In: Proceedings of the Information Networking (ICOIN), 2013 International Conference on. 2013. IEEE.
-
Yu, S., Gui, X., Lin, J., 2013. An approach with two-stage mode to detect cache-based side channel attacks. In: Proceedings of the Information Networking (ICOIN), 2013 International Conference on. 2013. IEEE.
-
(2013)
-
-
Yu, S.1
Gui, X.2
Lin, J.3
-
136
-
-
79951609863
-
A view about cloud data security from data life cycle
-
In: Proceedings of the Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on. 2010. IEEE.
-
Yu, X., Wen, Q., 2010. A view about cloud data security from data life cycle. In: Proceedings of the Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on. 2010. IEEE.
-
(2010)
-
-
Yu, X.1
Wen, Q.2
-
137
-
-
58049137106
-
-
PALM: security preserving VM live migration for systems with VMM-enforced protection. In: Proceedings of the Trusted Infrastructure Technologies Conference, 2008. APTC'08. Third Asia-Pacific. 2008. IEEE.
-
Zhang, F., et al., 2008. PALM: security preserving VM live migration for systems with VMM-enforced protection. In: Proceedings of the Trusted Infrastructure Technologies Conference, 2008. APTC'08. Third Asia-Pacific. 2008. IEEE.
-
(2008)
-
-
Zhang, F.1
-
138
-
-
38349008410
-
-
Virtual-machine-based intrusion detection on file-aware block level storage. In: Proceedings of the Computer Architecture and High Performance Computing, 2006. SBAC-PAD'06. 18th International Symposium on. 2006. IEEE.
-
Zhang, Y., et al., 2006. Virtual-machine-based intrusion detection on file-aware block level storage. In: Proceedings of the Computer Architecture and High Performance Computing, 2006. SBAC-PAD'06. 18th International Symposium on. 2006. IEEE.
-
(2006)
-
-
Zhang, Y.1
-
139
-
-
85177679463
-
-
Homealone: Co-residency detection in the cloud via side-channel analysis. In: Proceedings of the security and Privacy (SP), 2011 IEEE Symposium on. 2011. IEEE.
-
Zhang, Y., et al., 2011. Homealone: Co-residency detection in the cloud via side-channel analysis. In: Proceedings of the security and Privacy (SP), 2011 IEEE Symposium on. 2011. IEEE.
-
(2011)
-
-
Zhang, Y.1
-
140
-
-
84869859962
-
-
Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM conference on Computer and communications security. 2012. ACM.
-
Zhang, Y., et al., 2012. Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM conference on Computer and communications security. 2012. ACM.
-
(2012)
-
-
Zhang, Y.1
-
141
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis, D., Lekkas, D., Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28:3 (2012), 583–592.
-
(2012)
Futur. Gener. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
|