On Scalable and Efficient Security Risk Modelling of Cloud Computing Infrastructure based on Markov processes
-
Published:2017
Issue:
Volume:9
Page:03006
-
ISSN:2271-2097
-
Container-title:ITM Web of Conferences
-
language:
-
Short-container-title:ITM Web Conf.
Author:
Karras Dimitrios A.
Reference7 articles.
1. Helman P. and Liepins G., “Statistical foundations of audit trail analysis for the detection of computer misuse”, IEEE Trans. On Software Engineering, SE-19, 1993, pp. 886–901.
2. Denning D.E., ‘An Intrusion-detection Model’, IEEE Trans. On Software Engineering, SE-12, 1987, pp. 222–232.
3. Stoll C., ‘Stalking the Wily Hacker’, Communications of the ACM, 1988, pp. 484–497.
4. Setting optimal intrusion-detection thresholds
5. Intrusion detection: Its role and validation