Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
On-Demand Security Architecture for Cloud ComputingChen, Jianyong ; Wang, Yang ; Wang, XiaominComputer (Long Beach, Calif.), 2012-07, Vol.45 (7), p.73-78 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
A transform domain-based anomaly detection approach to network-wide trafficJiang, Dingde ; Xu, Zhengzheng ; Zhang, Peng ; Zhu, TingJournal of network and computer applications, 2014-04, Vol.40, p.292-306 [Periódico revisado por pares]Kidlington: Elsevier LtdTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Cloud Data Protection for the MassesSong, D. ; Shi, E. ; Fischer, I. ; Shankar, U.Computer (Long Beach, Calif.), 2012-01, Vol.45 (1), p.39-45 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
A survey of intrusion detection techniques in CloudModi, Chirag ; Patel, Dhiren ; Borisaniya, Bhavesh ; Patel, Hiren ; Patel, Avi ; Rajarajan, MuttukrishnanJournal of network and computer applications, 2013-01, Vol.36 (1), p.42-57 [Periódico revisado por pares]Kidlington: Elsevier LtdTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Resource management for Infrastructure as a Service (IaaS) in cloud computing: A surveyManvi, Sunilkumar S. ; Krishna Shyam, GopalJournal of network and computer applications, 2014-05, Vol.41, p.424-440 [Periódico revisado por pares]Kidlington: Elsevier LtdTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Enhancing Service Federation Trustworthiness through Online TestingBertolino, A. ; De Angelis, G. ; Kellomaki, S. ; Polini, A.Computer (Long Beach, Calif.), 2012-01, Vol.45 (1), p.66-72 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
From Microprocessors to Nanostores: Rethinking Data-Centric SystemsRanganathan, PComputer (Long Beach, Calif.), 2011-01, Vol.44 (1), p.39-48 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Lessons from StuxnetChen, T M ; Abu-Nimeh, SComputer (Long Beach, Calif.), 2011-04, Vol.44 (4), p.91-93 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
An intrusion detection and prevention system in cloud computing: A systematic reviewPatel, Ahmed ; Taghavi, Mona ; Bakhtiyari, Kaveh ; Celestino Júnior, JoaquimJournal of network and computer applications, 2013-01, Vol.36 (1), p.25-41 [Periódico revisado por pares]Kidlington: Elsevier LtdTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networksXue, Kaiping ; Ma, Changsha ; Hong, Peilin ; Ding, RongJournal of network and computer applications, 2013-01, Vol.36 (1), p.316-323 [Periódico revisado por pares]Kidlington: Elsevier LtdTexto completo disponível |