-
3
-
-
84890011585
-
Towards designing privacy-preserving signature-based IDS as a service: A study and practice
-
Xi'an
-
Y. Meng, W. Li, 1. F. Kwok and Y. Xiang, "Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice, " Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Coriference on, Xi'an, 20 13, pp. 181-188.
-
(2013)
Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Coriference on
, pp. 181-188
-
-
Meng, Y.1
Li, W.2
Kwok, J.F.3
Xiang, Y.4
-
4
-
-
79955677448
-
Multi-level intrusion detection system and log management in cloud computing
-
Seoul
-
J. H. Lee, M. W. Park, J. H. Eom and T. M. Chung, "Multi-level Intrusion Detection System and log management in Cloud Computing, " Advanced Communication Technology (ICACT), 2011 13th International Conference on, Seoul, 20 1 1, pp. 552-555.
-
(2011)
Advanced Communication Technology (ICACT), 2011 13th International Conference on
, pp. 552-555
-
-
Lee, J.H.1
Park, M.W.2
Eom, J.H.3
Chung, T.M.4
-
5
-
-
84857574309
-
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
-
Orlando, FL
-
S. T. Zargar, H. Takabi and 1. B. D. Joshi, "DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments, " Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Coriference on, Orlando, FL, 2011, pp. 332-341.
-
(2011)
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Coriference on
, pp. 332-341
-
-
Zargar, S.T.1
Takabi, H.2
Joshi, J.B.D.3
-
6
-
-
84874479828
-
Cloud computing architectures based IDS
-
Agadir
-
E. N. Saad, K. E. Mahdi and M. Zbakh, "Cloud computing architectures based IDS, " Complex Systems (ICCS), 2012 International Conference on, Agadir, 2012, pp. 1-6.
-
(2012)
Complex Systems (ICCS), 2012 International Conference on
, pp. 1-6
-
-
Saad, E.N.1
Mahdi, K.E.2
Zbakh, M.3
-
7
-
-
84922792143
-
SDNIPS: Enabling software-defined networking based intrusion prevention system in clouds
-
Rio de Janeiro
-
T. Xing, Z. Xiong, D. Huang and D. Medhi, "SDNIPS: Enabling Software-Defined Networking based intrusion prevention system in clouds, " 10th International Coriference on Network and Service Management (CNSM) and Workshop, Rio de Janeiro, 20 14, pp. 308-3 1 1.
-
(2014)
10th International Coriference on Network and Service Management (CNSM) and Workshop
, pp. 308-311
-
-
Xing, T.1
Xiong, Z.2
Huang, D.3
Medhi, D.4
-
8
-
-
77957872950
-
Cloud security and privacy
-
O'Reilly Media
-
Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 336.
-
(2009)
An Enterprise Perspective on Risks and Compliance
, pp. 336
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
10
-
-
85010348738
-
Security-as - A service from clouds: A comprehensive analysis
-
April
-
Deepak Sharma, Dr. C A. Dhote, Manish Potey, 'Security-as-aService from Clouds: A comprehensive Analysis', IlCA Volume 67-Number 3, April 20 13
-
(2013)
IlCA 67
, Issue.3
-
-
Sharma, D.1
Dhote, C.A.2
Potey, M.3
-
11
-
-
85010351552
-
Security-as - A service from clouds: A survey
-
October
-
Deepak Sharma, Dr. C A. Dhote, Manish Potey, 'Security-as-aService from clouds: A survey' IIJC Vol I Issue 4, October 20 1 1.
-
(2011)
IIJC
, vol.1
, Issue.4
-
-
Sharma, D.1
Dhote, C.A.2
Potey, M.3
|