Author:
Luo Weiliang,Xu Li,Zhan Zhenxin,Zheng Qingji,Xu Shouhuai
Reference56 articles.
1. Almotairi, S.I., Clark, A.J., Dacier, M., Leita, C., Mohay, G.M., Pham, V.H., Thonnard, O., Zimmermann, J.: Extracting inter-arrival time based behaviour from honeypot traffic using cliques. In: Proceedings of the 5th Australian Digital Forensics Conference, Perth, pp. 79–87 (2007)
2. Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: Characterization of attackers’ activities in honeypot traffic using principal component analysis. In: Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, NPC’08, Shanghai, pp. 147–154. IEEE Computer Society, Washington, DC (2008)
3. Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: A technique for detecting new attacks in low-interaction honeypot traffic. In: Proceedings of the 4th International Conference on Internet Monitoring and Protection, ICIMP’09, Venice, pp. 7–13. IEEE Computer Society, Washington, DC (2009)
4. An, K.: Resource management and fault tolerance principles for supporting distributed real-time and embedded systems in the cloud. In: Proceedings of the 9th Middleware Doctoral Symposium of the 13th ACM/IFIP/USENIX International Middleware Conference, MIDDLEWARE’12, Montreal, pp. 4:1–4:6. ACM, New York (2012). doi:10.1145/2405688.2405692
5. Anderson, T.E.: weforum.org, Exploring the future of cloud computing: riding the next wave of technology-driven transformation.
http://goo.gl/BeR45
(2010)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献