An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

Beyond digital forensics. A cloud computing perspective over incident response and reporting

A Pătraşcu, VV Patriciu - 2013 IEEE 8th International …, 2013 - ieeexplore.ieee.org
Cloud computing represents a different paradigm in distributed computing that involves
more and more researchers. In this context, we can see that there is a need for knowing …

Risk visualization and alerting system: Architecture and proof-of-concept implementation

T Takahashi, K Emura, A Kanaoka, S Matsuo… - Proceedings of the first …, 2013 - dl.acm.org
The number of computer security incidents is rising in unison with the development of cyber-
society. One reason for this is a lack of users' security awareness. The widespread use of …

Toward automated reduction of human errors based on cognitive analysis

D Miyamoto, T Takahashi - 2013 Seventh International …, 2013 - ieeexplore.ieee.org
Following the immense development of cyber society where various activities including e-
commerce take place, the demands for security is rapidly growing. Among major causes of …

Towards an Ontology for Cloud Security Obligations

K Bernsmed, A Undheim, PH Meland… - 2013 International …, 2013 - ieeexplore.ieee.org
This paper presents an ontology for Cloud security obligations, which is based on a number
of industry accepted standards and guidelines. The ontology terms and relationships have …

[PDF][PDF] Proactive Automated dependable resource management in cloud environments

A Schwanengel, G Kaefer… - Proceedings of the 7th …, 2013 - personales.upv.es
Cloud Computing comes along with easy and selfmanaged resource provisioning and
releasing. However, booting and shutting down of instances still means dealing with …

国を超えたチームワークを実現する国際標準化活動

高橋健志 - 電子情報通信学会通信ソサイエティマガジン, 2013 - jstage.jst.go.jp
国ごとに投票権を持っているため, ある特定の先進国が強い発言権を持つわけではない.
国の数だけ考えれば, 発展途上国の方が格段に多いため, 彼らを無視した決議はあり得ない …

[引用][C] VADA-Veracity Aware Defence Algorithm for Cloud Computing Environment

V Goyal, C Kant - 2013