-
1
-
-
77957951132
-
How to enhance cloud architectures to enable cross-federation
-
Jul
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How to Enhance Cloud Architectures to Enable Cross-Federation, " 2010 IEEE 3rd Int. Conf. Cloud Comput., pp. 337-345, Jul. 2010.
-
(2010)
2010 IEEE 3rd Int. Conf. Cloud Comput.
, pp. 337-345
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
4
-
-
84940750587
-
Security as a service for a cloud federation
-
A. Macdermott, Q. Shi, M. Merabti, and K. Kifayat, "Security as a Service for a Cloud Federation, " in The 15th Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2014), 2014, pp. 77-82.
-
(2014)
The 15th Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2014)
, pp. 77-82
-
-
Macdermott, A.1
Shi, Q.2
Merabti, M.3
Kifayat, K.4
-
6
-
-
84858158707
-
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
-
Jun
-
M. T. Khorshed, a. B. M. S. Ali, and S. a. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing, " Futur. Gener. Comput. Syst., vol. 28, no. 6, pp. 833-851, Jun. 2012.
-
(2012)
Futur. Gener. Comput. Syst.
, vol.28
, Issue.6
, pp. 833-851
-
-
Khorshed, M.T.1
Ali, S.M.A.B.2
Wasimi S, A.3
-
7
-
-
77950601673
-
Cloud security with virtualized defense and reputation-based trust mangement
-
Dec
-
K. Hwang, S. Kulkareni, and Y. Hu, "Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement, " 2009 Eighth IEEE Int. Conf. Dependable, Auton. Secur. Comput., pp. 717-722, Dec. 2009.
-
(2009)
2009 Eighth IEEE Int. Conf. Dependable, Auton. Secur. Comput.
, pp. 717-722
-
-
Hwang, K.1
Kulkareni, S.2
Hu, Y.3
-
8
-
-
84883332566
-
Security issues in cloud federations
-
M. Rak, M. Ficco, J. Luna, H. Ghani, N. Suri, S. Panica, and D. Petcu, "Security Issues in Cloud Federations, " in Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice, 2012, pp. 176-194.
-
(2012)
Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice
, pp. 176-194
-
-
Rak, M.1
Ficco, M.2
Luna, J.3
Ghani, H.4
Suri, N.5
Panica, S.6
Petcu, D.7
-
9
-
-
84862808033
-
Cloud federation in a layered service model
-
Sep
-
D. Villegas, N. Bobroff, I. Rodero, J. Delgado, Y. Liu, A. Devarakonda, L. Fong, S. Masoud Sadjadi, and M. Parashar, "Cloud federation in a layered service model, " J. Comput. Syst. Sci., vol. 78, no. 5, pp. 1330-1344, Sep. 2012.
-
(2012)
J. Comput. Syst. Sci.
, vol.78
, Issue.5
, pp. 1330-1344
-
-
Villegas, D.1
Bobroff, N.2
Rodero, I.3
Delgado, J.4
Liu, Y.5
Devarakonda, A.6
Fong, L.7
Masoud Sadjadi, S.8
Parashar, M.9
-
12
-
-
78049513508
-
A survey of intrusion detection and prevention systems
-
A. Patel, Q. Qassim, and C. Wills, "A survey of intrusion detection and prevention systems, " Inf. Manag. Comput. Secur., vol. 18, no. 4, pp. 277-290, 2010.
-
(2010)
Inf. Manag. Comput. Secur.
, vol.18
, Issue.4
, pp. 277-290
-
-
Patel, A.1
Qassim, Q.2
Wills, C.3
-
14
-
-
84988283226
-
A threat-aware hybrid intrusion-detection architecture for dynamic network environments
-
S. Neelakantan and S. Rao, "A Threat-Aware Hybrid Intrusion-Detection Architecture for Dynamic Network Environments, " CSI J. Comput., vol. 1, no. 3, 2012.
-
(2012)
CSI J. Comput.
, vol.1
, Issue.3
-
-
Neelakantan, S.1
Rao, S.2
-
15
-
-
78649815408
-
A cooperative intrusion detection system framework for cloud computing networks
-
C.-C. Lo, C.-C. Huang, and J. Ku, "A Cooperative Intrusion Detection System Framework for Cloud Computing Networks, " in 2010 39th International Conference on Parallel Processing Workshops, 2010, pp. 280-284.
-
(2010)
2010 39th International Conference on Parallel Processing Workshops
, pp. 280-284
-
-
Lo, C.-C.1
Huang, C.-C.2
Ku, J.3
-
16
-
-
84862180406
-
A coordinator for scaling elastic applications across multiple clouds
-
R. N. Calheiros, A. N. Toosi, C. Vecchiola, and R. Buyya, "A coordinator for scaling elastic applications across multiple clouds, " Futur. Gener. Comput. Syst., vol. 28, no. 8, pp. 1350-1362, 2012.
-
(2012)
Futur. Gener. Comput. Syst.
, vol.28
, Issue.8
, pp. 1350-1362
-
-
Calheiros, R.N.1
Toosi, A.N.2
Vecchiola, C.3
Buyya, R.4
-
17
-
-
84885958390
-
GMonE: A complete approach to cloud monitoring
-
J. Montes, A. Sánchez, B. Memishi, M. S. Pérez, and G. Antoniu, "GMonE: A complete approach to cloud monitoring, " Futur. Gener. Comput. Syst., vol. 29, no. 8, pp. 2026-2040, 2013.
-
(2013)
Futur. Gener. Comput. Syst.
, vol.29
, Issue.8
, pp. 2026-2040
-
-
Montes, J.1
Sánchez, A.2
Memishi, B.3
Pérez, M.S.4
Antoniu, G.5
-
18
-
-
84876261368
-
Cloud computingbased forensic analysis for collaborative network security management system
-
Z. Chen, F. Han, J. Cao, X. Jiang, and S. Chen, "Cloud computingbased forensic analysis for collaborative network security management system, " Tsinghua Sci. Technol., vol. 18, no. 1, pp. 40-50, 2013
-
(2013)
Tsinghua Sci. Technol.
, vol.18
, Issue.1
, pp. 40-50
-
-
Chen, Z.1
Han, F.2
Cao, J.3
Jiang, X.4
Chen, S.5
-
19
-
-
84903436399
-
Intrusion detection system in cloud computing environment
-
S. N. Dhage and B. B. Meshram, "Intrusion detection system in cloud computing environment, " Int. J. Cloud Comput., vol. 1, no. 2/3, p. 261, 2012.
-
(2012)
Int. J. Cloud Comput.
, vol.1
, Issue.2-3
, pp. 261
-
-
Dhage, S.N.1
Meshram, B.B.2
-
21
-
-
39749091030
-
Intrusion detection engine based on dempster-shafer's theory of evidence
-
W. H. Jianhua Li and Q. Gao, "Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence, " in 2006 International Conference on Communications, Circuits and Systems Proceedings, 2006, vol. 2, no. 2003, pp. 1627-1631.
-
(2006)
2006 International Conference on Communications, Circuits and Systems Proceedings
, vol.2
, Issue.2003
, pp. 1627-1631
-
-
Jianhua Li, W.H.1
Gao, Q.2
-
22
-
-
78049486291
-
Anomaly detection using the dempster-shafer method
-
Q. Chen and U. Aickelin, "Anomaly Detection Using the Dempster-Shafer Method, " in DMIN, 2006, pp. 232-240.
-
(2006)
DMIN
, pp. 232-240
-
-
Chen, Q.1
Aickelin, U.2
-
24
-
-
84940766710
-
Evaluating the effects of cascading failures in a network of critical infrastructures
-
W. Hurst and A. Macdermott, "Evaluating the Effects of Cascading Failures in a Network of Critical Infrastructures, " Inderscience Int. J. Syst. Syst. Eng., vol. 6, no. 3, pp. 1-12, 2015.
-
(2015)
Inderscience Int. J. Syst. Syst. Eng.
, vol.6
, Issue.3
, pp. 1-12
-
-
Hurst, W.1
Macdermott, A.2
|