Author:
Gupta Yogesh,Saraswat Amit,Goyal Sunil Kumar
Publisher
Springer Nature Singapore
Reference21 articles.
1. Bailey M, Cooke E, Jahanian F, Nazario J, Watson D (2005) The internet motion sensor: a distributed blackhole monitoring system. In: Proceedings of network and distributed system security symposium (NDSS)
2. Xu G, Yu W, Chen Z, Zhang H, Moulema P, Fu X, Lu C (2015) A cloud computing-based system for cyber security management. Int J Parallel Emergent Distrib Syst 30(1):29–45
3. Yegneswaran V, Barford P, Jha S (2004) Global intrusion detection in the domino overlay system. In: Proceedings of the 11th IEEE network and distributed system security symposium (NDSS)
4. Yu W, Xu G, Chen Z, Moulema P (2013) A cloud computing-based architecture for cyber security situation awareness. In: Proceedings of 4th international workshop on security and privacy in cloud computing (SPCC)
5. Yu W, Zhang N, Fu X, Bettati R, Zhao W (2010) Location leakage of internet threat monitors: modeling and defense. IEEE Trans Comput (TC) 59(12):1655–1668