共 22 条
[11]
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2012, 28 (06)
:833-851
[13]
Mof M., 2011, ACM SIGOPS Operating Systems Review, V45, P38, DOI [10.1145/2007183.2007189, DOI 10.1145/2007183.2007189]
[14]
Patil P., 2015, J INFORM ENG APPL, V5, P31
[15]
Popuri V., 2011, INTRUSION DETECTION
[16]
Intrusion Detection in the Cloud
[J].
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS,
2009,
:729-734
[17]
Soares L. F., 2014, SECURITY PRIVACY TRU, P3
[18]
Taghavi Zargar S., 2012, DCDIDP DISTRIBUTED C
[19]
Vanathi R., 2012, International Conference on Computer Communication and Informatics (ICCCI -2012), P1
[20]
Yassin W., 2012, INT C CYBER SECURITY, P213