共 31 条
[1]
Artem V., Jun H., Security attack ontology for web services, Proc. of the 2nd Int. Conf. on Semantics, Knowledge, and Grid, pp. 42-49, (2006)
[2]
Borealis: Distributed Stream Processing Engine
[3]
Cheng F., Meinel C., Intrusion detection in the cloud, Proc. of the IEEE Int. Conf. on Dependable, Autonomic and Secure Computing, pp. 729-734, (2009)
[4]
Cheung S., Lindqvist U., Fong M.W., Modelling multistep cyber attacks for scenario recognition, Proc. of DARPA Information Survivability Conference and Exposition, pp. 284-292, (2003)
[5]
Cuppens F., Ortalo R., Lambda: A language to model a database for detection of attacks, Proc. of the 3rd International Symposium Recent Advances in Intrusion Detection (RAID 2000), LNCS, pp. 197-216, (2000)
[6]
Curry D., Debar H., Intrusion Detection Message Exchange Format: Extensible Markup Language (XML) Document Type Definition, (2003)
[7]
Ficco M., Rak M., Intrusion tolerant approach for denial of service attacks to web services, Proc. of the 1st Int. Conf. on Data Compression, Communication, and Processing, pp. 285-292, (2011)
[8]
Ficco M., Rak M., Intrusion tolerance as a service: A SLA-based solution, Proc. of the 2nd Int. Conf. on Cloud Computing and Services Science, pp. 375-384, (2012)
[9]
Ficco M., Rak M., Intrusion tolerance in cloud applications: The mosaic approach, Proc. of the 6th Int. Conf. on Complex, Intelligent, and Software Intensive Systems, (2012)
[10]
Ficco M., Rak M., Intrusion tolerance of stealth dos attacks to web services, Proc. of the Int. Conf. on Information Security and Privacy, LNCS, 376, pp. 579-584, (2012)