Author:
Majumdar Suryadipta,Tabiban Azadeh,Mohammady Meisam,Oqaily Alaa,Jarraya Yosr,Pourzandi Makan,Wang Lingyu,Debbabi Mourad
Publisher
Springer International Publishing
Reference44 articles.
1. Aikat, J., et al.: Rethinking security in the era of cloud computing. IEEE Secur. Priv. 15(3), 60–69 (2017)
2. Amazon. Amazon virtual private cloud. https://aws.amazon.com/vpc . Accessed 14 Feb 2018
3. Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical report, Citeseer (1997)
4. Lecture Notes in Computer Science;S Bleikertz,2011
5. Bleikertz, S., Vogel, C., Groß, T.: Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. In: Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), pp. 26–35. ACM (2014)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
2. Kunerva: Automated Network Policy Discovery Framework for Containers;IEEE Access;2023
3. VeriNeS;Proceedings of the 36th Annual ACM Symposium on Applied Computing;2021-03-22
4. ProSAS: Proactive Security Auditing System for Clouds;IEEE Transactions on Dependable and Secure Computing;2021
5. SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME;Advances in Digital Forensics XVII;2021