共 96 条
[51]
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2012, 28 (06)
:833-851
[52]
Kim H., 2009, PROC VEE, P101
[53]
A Self-protection Mechanism against Stepping-stone Attacks for IaaS Clouds
[J].
2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC),
2012,
:539-546
[54]
Leandro M.A.P., 2012, ICN, P88
[55]
Lin W., 2012, P 2012 32 INT C DIST, P417
[56]
Liu S, 2010, PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RESOURCE ENVIRONMENT AND INFORMATION TECHNOLOGY IN 2010 (REIT' 2010), P510
[57]
Mahmood Z., 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies, P49, DOI 10.1109/EIDWT.2011.16
[58]
Mareschal B., 1987, AIDE DECISION MULTIC, P175
[59]
Martignoni L, 2009, LECT NOTES COMPUT SC, V5905, P178, DOI 10.1007/978-3-642-10772-6_14
[60]
Mathisen E., 2011, 2011 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST 2011), P208, DOI 10.1109/DEST.2011.5936627