Author:
Hawedi Mohamed,Talhi Chamseddine,Boucheneb Hanifa
Reference10 articles.
1. A. Juels, A. Oprea, K. D. Bowers, Security issues for cloud computing [3], Meta 4 (5).
2. Cloud computing security using ids-am-clust, honeyd, honeywall and honeycomb;Saadi;Procedia Computer Science,2016
3. M. Ficco, S. Venticinque, B. Di Martino, Mosaic-based intrusion detection framework for cloud computing, in: OTM Confederated International Conferences” On the Move to Meaningful Internet Systems”, Springer, 2012, pp. 628–644.
4. Security as a service model for cloud environment;Varadharajan;IEEE Transactions on network and Service management,2014
5. U. Tupakula, V. Varadharajan, N. Akku, Intrusion detection techniques for infrastructure as a service cloud, in: Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on, IEEE, 2011, pp. 744–751.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献