共 12 条
[1]
Quick Rich, 5 Reasons Enterprises Are Frightened of the Cloud, (2013)
[2]
Mehmood Yasir, Shibli Muhammad Awais, Habiba Umme, Masood Rahat, Intrusion Detection System in Cloud Computing: Challenges and opportunities, 2013 2nd National Conference on Information Assurance (NCIA), pp. 59-66, (2013)
[3]
Dhage Sudhir N., Meshram B.b., Intrusion detection system in cloud computing environment, International Journal of Cloud Computing, 1, 2-3, pp. 261-282, (2012)
[4]
IDG Enterprise Cloud Research. Cloud Computing Key Trends and Future Effects, (2013)
[5]
Chatzigiannakis V., Androulidakis G., Grammatikou M., Maglaris B., A Distributed Intrusion Detection Prototype Using Security Agents, Workshop of the HP OpenView University Association, (2004)
[6]
Zhou Chenfeng Vincent, Leckie Christopher, Karunasekera Shanika, A survey of coordinated attacks and collaborative intrusion detection, Computers and Security, 29, 1, pp. 124-140, (2010)
[7]
Teng S. H., A Study on Object-Monitoring-based Distributed and Collaborative Intrusion Detection, (2008)
[8]
Ostermann Simon, Iosup Alexandru, Yigitbasi Nezih, Prodan Radu, Fahringer Thomas, Epema Dick, An Early Performance Analysis of Cloud Computing Services for Scientific Computing, (2008)
[9]
Smith Clifton L., Brooks David J., The Theory and Practice of Security, (2013)
[10]
Messmer Ellen, Cloud Security Alliance formed to promote best practices | computerworld