1 |
K. Popovic and Z. Hocenski, "Cloud Computing Security Issues and Challenges," In MIPRO, 2010 Proceedings of the 33rd International Convention, 2010, pp. 344-349.
|
2 |
M. Jensen, N. Gruschka, L. L. Iacono, and G. Horst, "On Technical Security Issues in Cloud Computing," IEEE International Conference on Cloud Computing, 2009, pp. 109-116.
|
3 |
B. R. Kandukuri, R. Paturi, A. Rakshit, "Cloud Security Issues," In Proceedings of IEEE International Conference on Services Computing, 2009, pp. 517-520.
|
4 |
K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, "Intrusion Detection for Grid and Cloud Computing," IT Professional, Vol. 12, 2010, pp. 38-43.
|
5 |
정성민, 김태경, "효율적인 클라우드 컴퓨팅을 위한 가상장비 할당 방법," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 73-79.
|
6 |
A. Bakshi and Yogesh B, "Securing Cloud from DDoS Attacks using Intrusion Detection System in Virtual Machine," In Second International Conference on Communication Software and Networks, Singapore, 2010, pp. 260-264.
|
7 |
최윤정, "침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론," 디지털정보산업학회지, 제6권, 제1호, 2010, pp. 1-12.
|
8 |
M. I. Sharif, W. Lee, W. D. Cui, A. Lanzi, "Secure In-VM Monitoring Using Hardware Virtualization," In Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 477-487.
|
9 |
Ch. Lo, Ch. Huang and J. Ku, "A Cooperative Intrusion Detection System Framework for Cloud Computing Networks," In 39th International Conference on Parallel Processing Workshops, 2010, pp. 280-284.
|