Author:
Meryem Amar,Samira Douzi,Bouabid El Ouahidi,Mouad Lemoudden
Reference24 articles.
1. «Analysis of KDD ‘99 Intrusion Detection Dataset for Selection of Relevance Features,»;Adetunmbi;Engineering and Computer Science,2010
2. Targio I., Ibrar Y., Nor Badrul A. et al « The rise of “big data” on cloud computing: Review and open research issues,» Information Systems, pp. 98-115, 2015.
3. Grance T., Peter M. «The NIST Definition of Cloud Computing,» NIST Special Publication, 2011.
4. Amar M., Lemoudden. M. El. Ouahidi. B. «Log File’s Centralization to Improve Cloud Security,» IEEE Xplore, 2017.
5. «Security in cloud computing: Opportunities and challenges,»;Mazhar;Information Sciences,2015
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献