Author:
Modi Chirag N.,Patel Dhiren R.,Patel Avi,Rajarajan Muttukrishnan
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference18 articles.
1. Bakshi, A. & B. Yogesh. 2010. Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine. In Second International Conference on Communication Software and Networks. pp. 260-264.
2. C. C. Lo, C.C. Huang & J. Ku. 2008. Cooperative Intrusion Detection System Framework for Cloud Computing Networks. In First IEEE International Conference on Ubi-Media Computing. pp. 280-284.
3. C. Mazzariello, R. Bifulco & R. Canonoco. 2010. Integrating a network IDS into an Open source Cloud computing. In Sixth International conference.
4. on Information Assurance and Security (IAS). pp. 265-270. Cloud Computing Comparison Guide. N.d. http://www.webhostingunleashed.com/whitepaper/cloud-computing-comparison/
5. D. J. Brown, B. Suckow & T. Wang. 2002. A Survey of Intrusion Detection Systems. Technical report Department of Computer Science, University of California, San Diego.
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献