1 |
B. R. Kandukuri, R. Paturi, A. Rakshit, "Cloud Security Issues," In Proceedings of IEEE International Conference on Services Computing, 2009, pp. 517-520.
|
2 |
A. Kundu, C. D. Banerjee, P. Saha, "Introducing New Services in Cloud Computing Environment," International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, 2010, pp. 143-152.
|
3 |
신대철, 김홍윤, "침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발," 디지털산업정보학회지, 제 8권, 제1호, 2012, pp. 125-137.
|
4 |
M. Jensen, N. Gruschka, L. L. Iacono, and G. Horst, "On Technical Security Issues in Cloud Computing," IEEE International Conference on Cloud Computing, 2009, pp. 109-116.
|
5 |
Z. Mahmood, "Cloud Computing: Characteristics and Deployment Approaches," 11th IEEE International Conference on Computer and Information Technology, 2011, pp. 121-126.
|
6 |
임양환, "이동통신과 인터넷 결합상품의 경쟁력 연구 : 소비자 효용을 중심으로," 디지털산업정보학회지, 제6권, 제1호, 2010, pp. 159-167.
|
7 |
K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, "Intrusion Detection for Grid and Cloud Computing," IT Professional, Vol. 12, 2010, pp. 38-43.
|
8 |
I. Gul and M. Hussain, "Distributed Cloud Intrusion Detection Model," International Journal of Advanced Science and Technology, vol. 34, 2011, pp. 71-82.
|