1. Intrusion detection in the cloud;Roschke;In: IEEE International Symposium on Dependable, Autonomic and Secure Computing,2009
2. Grance, T., Mell, P.: The nist definition of cloud computing. National Institute of Standards & Technology (NIST) (2009), http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
3. Ramya. R Securing the system using honeypot in cloud computing environment International Journal of Multidisciplinary Research and Development Volume: 2, Issue: 4, 172-176April 2015.
4. Exploiting the sensing relevancies of source nodes for optimizations invisual sensor networks;Costa;Multimed Tools Appl,2011
5. Y. Sun, Y. Luo, and all, Fast live cloning of virtual machine based on xen. In High Performance Computing and Communications HPCC ‘09. 11th IEEE International Conference on, pages 392-399, June 2009.