Author:
Kale Rahul Vishwanath,Veeravalli Bharadwaj,Wang Xiaoli
Publisher
Springer International Publishing
Reference27 articles.
1. Awan, M. S. K., Burnap, P., & Rana, O. (2016). Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers & Security, 57, 31–46.
2. Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Energy-efficient data replication in cloud computing datacenters. Cluster Computing, 18(1), 385–402.
3. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
4. da Silva, G. H. G., Holanda, M., & Araujo, A. (2016). Data replication policy in a cloud computing environment. In 11th Iberian Conference on Information Systems and Technologies (CISTI), 2016 (pp. 1–6). Piscataway: IEEE.
5. di Vimercati, S. D. C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., & Samarati, P. (2014). Fragmentation in presence of data dependencies. IEEE Transactions on Dependable and Secure Computing, 11(6), 510–523.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献