设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(5)
CNKI会议论文(1)
CNKI学位论文(344)
CNKI期刊论文0611(3)
知网期刊论文(1413)
在“
Elsevier电子期刊
”中,
命中:
85
条,耗时:小于0.01 秒
在所有数据库中总计命中:
1,766
条
1.
Intrusion detection techniques in
cloud
environment: A survey
作者:
Preeti Mishra
a
;
Emmanuel S. Pilli
a
;
espilli.cse@mnit.ac.in" class="auth_mail" title="E-mail the corresponding author
;
Vijay Varadharajan
b
;
Udaya Tupakula
b
关键词:
Intrusion detection
;
Cloud
security
;
Virtual machine introspection
;
Hypervisor introspection
;
Cloud
attacks
刊名:Journal of Network and Computer Applications
出版年:2017
2.
Cloud
security issues and challenges: A survey
作者:
Ashish Singh
;
ashish.cse15@nitp.ac.in
;
Kakali Chatterjee
kakali@nitp.ac.in
关键词:
Cloud
computing
;
Cloud
framework
;
Cloud
security
;
Cloud
security challenges
;
Cloud
security issues
刊名:Journal of Network and Computer Applications
出版年:2017
3.
Multilevel classification of security concerns in
cloud
computing
作者:
Syed Asad Hussain
a
;
asadhussain@ciitlahore.edu.pk
;
Mehwish Fatima
a
;
mehwish.fatima@ciitlahore.edu.pk
;
Atif Saeed
b
;
a.saeed2@lancs.ac.uk
;
Imran Raza
a
;
iraza@ciitlahore.edu.pk
;
Raja Khurram Shahzad
c
;
khurram.shahzad@bth.se
关键词:
Cloud
computing
;
Security
;
Virtualization
;
SaaS
;
PaaS
;
IaaS
刊名:Applied Computing and Informatics
出版年:2017
4.
Toward better data veracity in mobile
cloud
computing: A context-aware and incentive-based reputation mechanism
作者:
Hui Lin
a
;
Jia Hu
b
;
jiahu9@gmail.com
;
Youliang Tian
c
;
Li Yang
d
;
Li Xu
a
关键词:
Data veracity
;
Mobile
cloud
computing
;
Reputation mechanism
;
Mechanism design
刊名:Information Sciences
出版年:2017
5.
Towards an efficient snapshot approach for virtual machines in
cloud
s
作者:
Jianxin Li
;
lijx@act.buaa.edu.cn" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Yangyang Zhang
zhangyy@act.buaa.edu.cn" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Jingsheng Zheng
zhengjs@act.buaa.edu.cn" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Hanqing Liu
liuhq@act.buaa.edu.cn" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Bo Li
libo@act.buaa.edu.cn" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Jinpeng Huai
huaijp@buaa.edu.cn" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Cloud
computing
;
High-availability
;
Virtual machine
;
Live snapshot
;
Virtual disk image
刊名:Information Sciences
出版年:2017
6.
Optimal data partitioning in
cloud
computing system with random server assignment
作者:
Gregory Levitin
a
;
b
;
levitin@iec.co.il
Author Vitae
;
Liudong Xing
c
;
lxing@umassd.edu
Author Vitae
;
Yuanshun Dai
a
Author Vitae
关键词:
Cloud
computing
;
Virtual machine
;
Co-residence attack
;
Data partitioning
;
Optimization
;
Minmax
刊名:Future Generation Computer Systems
出版年:2017
7.
Insecurity of an identity-based public auditing protocol for the outsourced data in
cloud
storage
作者:
Debiao He
a
;
b
;
Huaqun Wang
;
c
;
wanghuaqun@yahoo.com.cn" class="auth_mail" title="E-mail the corresponding author
;
wanghuaqun@aliyun.com" class="auth_mail" title="E-mail the corresponding author
;
Jianhong Zhang
d
;
Lina Wang
e
关键词:
Public auditing
;
Identity-based cryptography
;
Provable security
;
Bilinear pairing
刊名:Information Sciences
出版年:2017
8.
Controlled access to
cloud
resources for mitigating Economic Denial of Sustainability (EDoS)
attacks
作者:
Zubair A. Baig
;
a
;
z.baig@ecu.edu.au" class="auth_mail" title="E-mail the corresponding author
;
z.baig@ecu.edu.au" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Sadiq M. Sait
b
;
sadiq@kfupm.edu.sa" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Farid Binbeshr
b
;
g201001900@kfupm.edu.sa" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Economic Denial of Sustainability
attacks
(EDoS)
;
Cloud
computing
;
Network security
;
Rate control
刊名:Computer Networks
出版年:2016
9.
Distributed denial of service (DDoS) resilience in
cloud
: Review and conceptual
cloud
DDoS mitigation framework
作者:
Opeyemi Osanaiye
a
;
b
;
Kim-Kwang Raymond Choo
b
;
c
;
raymond.choo@fulbrightmail.org" class="auth_mail" title="E-mail the corresponding author
;
Mqhele Dlodlo
a
关键词:
Anomaly-based
;
Change point detection
;
Cloud
distributed denial of service (DDoS)
attacks
;
Cloud
distributed denial of service (DDoS) survey
;
Distributed denial of service (DDoS) attack taxonomy
;
Flooding
attacks
刊名:Journal of Network and Computer Applications
出版年:2016
10.
On
cloud
security
attacks
: A taxonomy and intrusion detection and prevention as a service
作者:
Salman Iqbal
a
;
Author Vitae
;
Miss Laiha Mat Kiah
a
;
Author Vitae
;
Babak Dhaghighi
a
Author Vitae
;
Muzammil Hussain
a
Author Vitae
;
Suleman Khan
a
Author Vitae
;
Muhammad Khurram Khan
b
Author Vitae
;
Kim-Kwang Raymond Choo
c
;
d
;
e
;
raymond.choo@fulbrightmail.org" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Cloud
computing
;
Taxonomy
;
Security
attacks
;
Intrusion detection
刊名:Journal of Network and Computer Applications
出版年:2016
1
2
3
4
5
6
7
8
9
按检索点细分(85)
题名(5)
关键词(9)
文摘(76)
按出版年细分(85)
2027年及以后(8)
2017年(7)
2016年(23)
2015年(8)
2014年(1)
2013年(7)
2012年(5)
2011年(10)
2010年(2)
2009年(1)
2008年(3)
2007年(1)
2001年(2)
2000年及以前(7)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.