1. Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl.Netw. Comput. Appl. 36(1), 16–24 (2013)
2. Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl.Netw. Comput. Appl. 36(1), 25–41 (2013)
3. Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl.Netw. Comput. Appl. 36(1), 42–57 (2013)
4. Kumar, U., Gohil, B.N.: A survey on intrusion detection systems for cloud computing environment. Int. J. Comput. Appl.Comput. Appl. 109(1), 6–15 (2015)
5. Araújo, J.D., Abdelouahab, Z.: Virtualization in intrusion detection systems: a study on different approaches for cloud computing environments. Int. J. Comput. Sci. Network Secur. 13(11), 135–142 (2013)