Author:
Chaturvedi Amit Kumar,Kumar Punit,Sharma Kalpana
Reference20 articles.
1. Roschke S, Cheng F, Meinel C (2009) An extensible and virtualization-compatible ids management architecture, 2:130–134
2. Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42–57
3. Mazzariello C, Bifulco R, Canonico R (2010) Integrating a network id into an open source cloud computing environment, pp 265–270
4. Jones AK, Sielken RS (2000) Computer system intrusion detection: a survey. Computer Science Technical Report, pp 1–25
5. Lo C-C, Huang C-C, Ku J (2010) A cooperative intrusion detection system framework for cloud computing networks. pp 280–284