Author:
Özdemir Cemile Diler,Sandıkkaya Mehmet Tahir,Yaslan Yusuf
Publisher
Springer International Publishing
Reference23 articles.
1. Arshad, J., Townend, P., Xu, J.: An abstract model for integrated intrusion detection and severity analysis for clouds. In: Cloud Computing Advancements in Design, Implementation, and Technologies, vol. 1 (2012)
2. Banerjee, C., Kundu, A., Basu, M., Deb, P., Nag, D., Dattagupta, R.: A service based trust management classifier approach for cloud security. In: 2013 15th International Conference on Advanced Computing Technologies (ICACT), pp. 1–5. IEEE (2013)
3. Bazm, M.M., Lacoste, M., Südholt, M., Menaud, J.M.: Side Channels in the Cloud: Isolation Challenges, Attacks, and Countermeasures, March 2017.
https://hal.inria.fr/hal-01591808
. Working paper or preprint
4. Bazrafshan, Z., Hashemi, H., Fard, S.M.H., Hamzeh, A.: A survey on heuristic malware detection techniques. In: 2013 5th Conference on Information and Knowledge Technology (IKT), pp. 113–120. IEEE (2013)
5. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)