共 23 条
[1]
[Anonymous], INT J COMPUTER SCI
[2]
[Anonymous], 2009, NATL I STAND TECHNOL, DOI DOI 10.6028/NIST.SP.800-145
[3]
Awodele O, 2011, INT J COMPUTER
[4]
Bejtlich R., 2004, The Tao of Network Security Monitoring
[5]
Bhamidipati K, 2012, 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), P69, DOI 10.1109/ICCCTAM.2012.6488074
[6]
Bishop M., 2002, Computer Security: Art and Science
[7]
Cherdantseva Yulia, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P546, DOI 10.1109/ARES.2013.72
[8]
Chunye Gong, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P275, DOI 10.1109/ICPPW.2010.45
[9]
Cloud Computing: Issues and Challenges
[J].
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA),
2010,
:27-33
[10]
Erl T., 2013, Cloud computing: concepts, technology architecture