Author:
Gerard Akash,Latif Rabia,Iqbal Waseem,Gerard Naqash,Husnain Johar Ahmed,Asghar Umer
Publisher
Springer International Publishing
Reference16 articles.
1. Gens, F.: New IDC IT Cloud Service Survey: Top Benefits and Challenges, IDC Exchange (2009).
http://blogs.idc.com/ie/?p=730S
2. Gruschka, N., Jensen, M.: Attack surfaces: a taxonomy for attacks on cloud services. In: 2010 IEEE 3rd International Conference on Cloud Computing. IEEE (2010)
3. http://mil-embedded.com/articles/cloud-security-the-dod/
. Accessed 11 Dec 2017
4. Calheiros, R.N., et al.: A coordinator for scaling elastic applications across multiple clouds. Future Gener. Comput. Syst. 28(8), 1350–1362 (2012)
5. Lo, C.-C., Huang, C.-C., Ku, J.: A cooperative intrusion detection system framework for cloud computing networks. In: 2010 39th International Conference on Parallel Processing Workshops (ICPPW). IEEE (2010)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献