1 |
K. Dahbur, B. Mohammad, and A. B. Tarakji, "A survey of risks, threats and vulnerabilities in cloud computing," in Preceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications, 2011, pp. 1-6.
|
2 |
W. Cin, H. Ting-iei, and L. I. U. Xiao-yu, "Research on the Intrusion Detection Mechanism based on Cloud Computing," Computing, 2010, pp. 125-128.
|
3 |
정성민, 김태경, "효율적인 클라우드 컴퓨팅을 위한 가상장비 할당 방법," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 73-79.
|
4 |
주승환, 서희석, 김상연, "한국형 네트워크 보안시스템 성능 평가 방법론 설계," 디지털산업정보학회지, 제7권, 제3호, 2011, pp. 97-105.
|
5 |
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 43, no. 1, 2011, pp. 1-11.
|
6 |
U. Tupakula, V. Varadharajan, and N. Akku, "Intrusion Detection Techniques for Infrastructure as a Service Cloud," 2011 IEEE 9th International Conference on Depedable, Autonomic and Secure Computing, 2011, pp. 744-751.
|
7 |
엄정호, 박선호, 정태명, "네트워크 취약성 분석을 위한 확장된 사이버 공격 트리에 관한 연구," 디지털산업정보학회지, 제6권, 제3호, 2010, pp. 49-57.
|
8 |
F. Sabahi, "Secure Virtualization for Cloud Environment using Hypervisor-based Technology," Int. Journal of Machine Learning and Computing, Vol. 2, No. 1, 2012.
|
9 |
S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, and D. Xu, "DKSM: Subverting Virtual Machine Introspection for Fun and Profilt," Reliable Distributed Systems, 2010 29th IEEE Symposium on. 2010, pp. 82-91.
|
10 |
T. Mather, S. Kumaraswamy, and S. Latif, "Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance," O'reilly media, 2009.
|