共 22 条
- [11] A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing[J]. Khorshed, Md. Tanzim;Ali, A. B. M. Shawkat;Wasimi, Saleh A. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012(06)
- [12] Secure virtualization for cloud computing[J]. Lombardi, Flavio;Di Pietro, Roberto. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011(04)
- [13] Mof M., 2011, ACM SIGOPS Operating Systems Review, V45, P38, DOI [10.1145/2007183.2007189, DOI 10.1145/2007183.2007189]
- [14] Patil P., 2015, J INFORM ENG APPL, V5, P31
- [15] Popuri V., 2011, INTRUSION DETECTION
- [16] Intrusion Detection in the Cloud[J]. Roschke, Sebastian;Cheng, Feng;Meinel, Christoph. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009
- [17] Soares L. F., 2014, SECURITY PRIVACY TRU, P3
- [18] Taghavi Zargar S., 2012, DCDIDP DISTRIBUTED C
- [19] Vanathi R., 2012, International Conference on Computer Communication and Informatics (ICCCI -2012), P1
- [20] Yassin W., 2012, INT C CYBER SECURITY, P213