Author:
Kholidy Hisham A.,Erradi Abdelkarim,Abdelwahed Sherif,Baiardi Fabrizio
Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference33 articles.
1. Karen S, Peter M (2007) Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology(NIST). Special Publication, pp 800–894
2. Top Threats to Cloud Computing (2010) Cloud security alliance. http://www.cloudsecurityalliance.org/csaguide.pdf . V. 1.0
3. Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE ’08, pp 1–10
4. Jansen W, Karygiannis T (1999) Mobile agents and security. Special Publication, pp 800–819, NIST
5. Dastjerdi A, Abu Bakar K, Gholam SH (2009) Tabatabaei, distributed intrusion detection in clouds using mobile agents. In: 3 $$^{rd}$$ r d International Conf. on Advanced Engineering Computing and Application in Sciences, October 11, 2009—Sliema, Malta
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献