共 22 条
[1]
Hubbard D., Sutton M., Top Threats to Cloud Computing V1.0, Cloud Security Alliance, (2010)
[2]
Scheidell M., Intrusion detection system, Google Patents, (2009)
[3]
Yu D., Frincke D., A novel framework for alert correlation and understanding, Applied Cryptography and Network Security, (2004)
[4]
Armbrust M., Fox A., Griffith R., A view of cloud computing, Communications of the ACM, 53, pp. 50-58, (2010)
[5]
Jensen M.M., Schwenk J., Gruschka N., On technical security issues in cloud computing: Cloud Computing, (2009)
[6]
Bhardwaj S., Jain L., Jain S., Cloud computing: A study of infrastructure as a service (IAAS), International Journal of engineering and information Technology, 2, pp. 60-63, (2010)
[7]
Zissis D., Lekkas D., Addressing cloud computing security issues, Future Generation Computer Systems, 28, pp. 583-592, (2012)
[8]
Ren K., Wang C., Wang Q., Security challenges for the public cloud, Internet Computing, IEEE, 16, pp. 69-73, (2012)
[9]
Liu H., A new form of DOS attack in a cloud and its avoidance mechanism, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, (2010)
[10]
Ristenpart T., Tromer E., Shacham H., Exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, (2009)