1. Parikh, S.M.: A survey on cloud computing resource allocation techniques. In: 2013 Nirma University International Conference on Engineering (NUiCONE), pp. 1–5, November 28–30, 2013
2. Jia, Z.-P., Tian, X.: A novel security private cloud solution based on eCryptfs. In: 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), vol. 3, pp. 38–41, November 23–24, 2013
3. Zeidan, S., Trabelsi, Z.: A survey on firewall’s early packet rejection techniques. In: 2011 International Conference on Innovations in Information Technology (IIT), pp. 203–208, April 25–27, 2011
4. Pozo, S., Ceballos, R., Gasca, R.M.: CSP-based firewall rule set diagnosis using security policies. In: The Second International Conference on Availability, Reliability and Security, ARES 2007, pp. 723–729, April 10–13, 2007
5. Tomasek, M., Cajkovsky, M., Mados, B.: Intrusion detection system based on system behavior. In: 2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), pp. 271–275, January 26–28, 2012