-
1
-
-
84910613242
-
Security risk assessment framework for cloud computing environments
-
Albakri S.H., Shanmugam B., Samy G.N., Idris N.B., Ahmed A. Security risk assessment framework for cloud computing environments. Secur. Commun. Networks 2014, 7(11):2114-2124.
-
(2014)
Secur. Commun. Networks
, vol.7
, Issue.11
, pp. 2114-2124
-
-
Albakri, S.H.1
Shanmugam, B.2
Samy, G.N.3
Idris, N.B.4
Ahmed, A.5
-
2
-
-
84871979421
-
Let me in the cloud: analysis of the benefit and risk assessment of cloud platform
-
Aleem A., Sprott C.R. Let me in the cloud: analysis of the benefit and risk assessment of cloud platform. J. Financ. Crime 2013, 20(1):6-24.
-
(2013)
J. Financ. Crime
, vol.20
, Issue.1
, pp. 6-24
-
-
Aleem, A.1
Sprott, C.R.2
-
3
-
-
85054283125
-
Amazon CloudWatch [Online]
-
Accessed: 28-Oct-2014
-
Amazon Web Services, 2014. Amazon CloudWatch [Online]. Available: [Accessed: 28-Oct-2014]. http://aws.amazon.com/cloudwatch/.
-
(2014)
-
-
-
4
-
-
84863920457
-
-
Springer, Berlin Heidelberg
-
Anuar N.B., Papadaki M., Furnell S., Clarke N. A response strategy model for intrusion response systems 2012, 573-578. Springer, Berlin Heidelberg.
-
(2012)
A response strategy model for intrusion response systems
, pp. 573-578
-
-
Anuar, N.B.1
Papadaki, M.2
Furnell, S.3
Clarke, N.4
-
6
-
-
78650003609
-
Security metrics and security investment models
-
Springer, Berlin Heidelberg
-
Böhme R. Security metrics and security investment models. Advances in Information and Computer Security 2010, 10-24. Springer, Berlin Heidelberg.
-
(2010)
Advances in Information and Computer Security
, pp. 10-24
-
-
Böhme, R.1
-
10
-
-
77956387185
-
Security Guidance for Critical Areas of Focus in Cloud Computing, CSA
-
[Online], [Accessed: 01-Aug-2014]
-
Cloud Security Alliance, 2011. Security Guidance for Critical Areas of Focus in Cloud Computing, CSA [Online]. Available: [Accessed: 01-Aug-2014]. https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf.
-
(2011)
-
-
-
11
-
-
84886731331
-
The Notorious Nine Cloud Computing Top Threats in 2013, CSA
-
[Online]. [Accessed: 12-Jul-2013]
-
Cloud Security Alliance, 2013. The Notorious Nine Cloud Computing Top Threats in 2013, CSA [Online]. Available: [Accessed: 12-Jul-2013]. http://www.cloudsecurityalliance.org/topthreats/.
-
(2013)
-
-
-
15
-
-
74049118787
-
-
Gupta R., Prasad K.H., Luan L., Rosu D., Ward C. Multi-dimensional knowledge integration for efficient incident management in a services cloud 2009, 57-64.
-
(2009)
Multi-dimensional knowledge integration for efficient incident management in a services cloud
, pp. 57-64
-
-
Gupta, R.1
Prasad, K.H.2
Luan, L.3
Rosu, D.4
Ward, C.5
-
18
-
-
84858158707
-
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
-
Khorshed T., Ali A.B.M.S., Wasimi S.A. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Futur. Gener. Comput. Syst. 2012, 28(6):833-851.
-
(2012)
Futur. Gener. Comput. Syst.
, vol.28
, Issue.6
, pp. 833-851
-
-
Khorshed, T.1
Ali, A.B.M.S.2
Wasimi, S.A.3
-
19
-
-
84883559428
-
Integrated digital forensic process model
-
Kohn M.D., Eloff M.M., Eloff J.H.P. Integrated digital forensic process model. Comput. Secur. 2013, 38(2013):103-115.
-
(2013)
Comput. Secur.
, vol.38
, Issue.2013
, pp. 103-115
-
-
Kohn, M.D.1
Eloff, M.M.2
Eloff, J.H.P.3
-
20
-
-
84889659756
-
-
no. 70
-
Kozlovszky M., Kovacs L., Torocsik M., Windisch G., Acs S., Prem D., Eigner G., Sas P., Schubert T., Póserné V. Cloud security monitoring and vulnerability management 2013, 265-269. no. 70.
-
(2013)
Cloud security monitoring and vulnerability management
, pp. 265-269
-
-
Kozlovszky, M.1
Kovacs, L.2
Torocsik, M.3
Windisch, G.4
Acs, S.5
Prem, D.6
Eigner, G.7
Sas, P.8
Schubert, T.9
Póserné, V.10
-
21
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Martini B., Choo K.-K.R. An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 2012, 9(2):71-80.
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
22
-
-
84889083567
-
Cloud storage forensics: ownCloud as a case study
-
Martini B., Choo K.-K.R. Cloud storage forensics: ownCloud as a case study. Digit. Investig. 2013, 10(4):1-13.
-
(2013)
Digit. Investig.
, vol.10
, Issue.4
, pp. 1-13
-
-
Martini, B.1
Choo, K.-K.R.2
-
25
-
-
33746748784
-
On incident handling and response: a state-of-the-art approach
-
Mitropoulos S., Patsos D., Douligeris C. On incident handling and response: a state-of-the-art approach. Comput. Secur. 2006, 25(5):351-370.
-
(2006)
Comput. Secur.
, vol.25
, Issue.5
, pp. 351-370
-
-
Mitropoulos, S.1
Patsos, D.2
Douligeris, C.3
-
26
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
Jan
-
Modi C., Patel D., Borisaniya B., Patel H., Patel A., Rajarajan M. A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. Jan. 2013, 36(1):42-57.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.1
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
28
-
-
84997032256
-
Handling compromised components in an IaaS cloud installation
-
Monfared A., Jaatun M.G. Handling compromised components in an IaaS cloud installation. J. Cloud Comput. Adv. Syst. Appl. 2012, 1(1):1-21.
-
(2012)
J. Cloud Comput. Adv. Syst. Appl.
, vol.1
, Issue.1
, pp. 1-21
-
-
Monfared, A.1
Jaatun, M.G.2
-
30
-
-
84870667876
-
An intrusion detection and prevention system in cloud computing: a systematic review
-
Jan
-
Patel A., Taghavi M., Bakhtiyari K., Celestino Júnior J. An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. Jan. 2013, 36(1):25-41.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.1
, pp. 25-41
-
-
Patel, A.1
Taghavi, M.2
Bakhtiyari, K.3
Celestino Júnior, J.4
-
31
-
-
84863498411
-
Privacy, security and trust in cloud computing
-
Springer, London, S. Pearson, G. Yee (Eds.)
-
Pearson S. Privacy, security and trust in cloud computing. Privacy and Security for Cloud Computing 2013, 3-42. Springer, London. S. Pearson, G. Yee (Eds.).
-
(2013)
Privacy and Security for Cloud Computing
, pp. 3-42
-
-
Pearson, S.1
-
33
-
-
84875147433
-
Digital droplets: microsoft SkyDrive forensic data remnants
-
Quick D., Choo K.-K.R. Digital droplets: microsoft SkyDrive forensic data remnants. Futur. Gener. Comput. Syst. 2013, 29(6):1378-1394.
-
(2013)
Futur. Gener. Comput. Syst.
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
34
-
-
84907200176
-
-
Syngress Publishing, Waltham, MA
-
Quick D., Martini B., Choo K.-K.R. Cloud Storage Forensics 2014, Syngress Publishing, Waltham, MA.
-
(2014)
Cloud Storage Forensics
-
-
Quick, D.1
Martini, B.2
Choo, K.-K.R.3
-
35
-
-
84916918767
-
A survey of information security incident handling in the cloud
-
Rahman N.H.A., Choo K.-K.R. A survey of information security incident handling in the cloud. Comput. Secur. 2015, 49:45-69. 10.1016/j.cose.2014.11.006.
-
(2015)
Comput. Secur.
, vol.49
, pp. 45-69
-
-
Rahman, N.H.A.1
Choo, K.-K.R.2
-
36
-
-
84958754081
-
Cloud forensics
-
Springer, Berlin Heidelberg
-
Ruan K., Carthy J., Kechadi T., Crosbie M. Cloud forensics. Advances in Digital Forensic VII 2011, 35-46. Springer, Berlin Heidelberg.
-
(2011)
Advances in Digital Forensic VII
, pp. 35-46
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
37
-
-
85054201835
-
A look at ownCloud
-
Saha A. A look at ownCloud. Linux J. 2012, 2012(218):64-75.
-
(2012)
Linux J.
, vol.2012
, Issue.218
, pp. 64-75
-
-
Saha, A.1
-
38
-
-
84904556910
-
-
Sarkar S.R., Mahindru R., Hosn R.A., Vogl N., Ramasamy H.V. Automated incident management for a platform-as-a-service cloud 2011, 5-11.
-
(2011)
Automated incident management for a platform-as-a-service cloud
, pp. 5-11
-
-
Sarkar, S.R.1
Mahindru, R.2
Hosn, R.A.3
Vogl, N.4
Ramasamy, H.V.5
-
39
-
-
85054252526
-
Towards an Intelligent Security Event Information Management System [Online]
-
[Accessed: 05-May-2014]
-
Suarez-Tangil, G., Palomar, E., Ribagorda, A., Zhang, Y., 2014. Towards an Intelligent Security Event Information Management System [Online]. Available: [Accessed: 05-May-2014]. http://www.seg.inf.uc3m.es/papers/2013nova-AIS-SIEM.pd.
-
(2014)
-
-
Suarez-Tangil, G.1
Palomar, E.2
Ribagorda, A.3
Zhang, Y.4
-
40
-
-
78149296009
-
Advanced framework for digital forensic technologies and procedures
-
Trček D., Abie H., Skomedal A., Starc I. Advanced framework for digital forensic technologies and procedures. J. Forensic Sci. 2010, 55(6):1471-1480.
-
(2010)
J. Forensic Sci.
, vol.55
, Issue.6
, pp. 1471-1480
-
-
Trček, D.1
Abie, H.2
Skomedal, A.3
Starc, I.4
-
42
-
-
84857224540
-
Cyber forensics in the cloud
-
Zimmerman S., Glavach D. Cyber forensics in the cloud. IA Newsletter 2011, 14(1):4-7.
-
(2011)
IA Newsletter
, vol.14
, Issue.1
, pp. 4-7
-
-
Zimmerman, S.1
Glavach, D.2
|