ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Architecture for High Confidence Cloud Security Monitoring
2015 IEEE International Conference on Cloud Engineering
◽
10.1109/ic2e.2015.21
◽
2015
◽
Cited By ~ 3
Author(s):
Teemu Kanstren
◽
Sami Lehtonen
◽
Reijo Savola
◽
Hilkka Kukkohovi
◽
Kimmo Hatonen
Keyword(s):
Cloud Security
◽
High Confidence
◽
Security Monitoring
Download Full-text
Related Documents
Cited By
References
Towards Cloud Security Monitoring: A Case Study
2016 Cybersecurity and Cyberforensics Conference (CCC)
◽
10.1109/ccc.2016.8
◽
2016
◽
Cited By ~ 1
Author(s):
Umar Mukhtar Ismail
◽
Syed Islam
◽
Shareeful Islam
Keyword(s):
Cloud Security
◽
Security Monitoring
Download Full-text
Opportunities in Using a Secure Element to Increase Confidence in Cloud Security Monitoring
2015 IEEE 8th International Conference on Cloud Computing
◽
10.1109/cloud.2015.159
◽
2015
◽
Cited By ~ 3
Author(s):
Teemu Kanstren
◽
Sami Lehtonen
◽
Hilkka Kukkohovi
Keyword(s):
Cloud Security
◽
Security Monitoring
◽
Secure Element
Download Full-text
Continuous Private Cloud Security Monitoring
Security in the Private Cloud
◽
10.1201/9781315372211-16
◽
2016
◽
pp. 235-260
Author(s):
Thorsten Herre
Keyword(s):
Cloud Security
◽
Private Cloud
◽
Security Monitoring
Download Full-text
Cloud security monitoring and vulnerability management
2013 IEEE 17th International Conference on Intelligent Engineering Systems (INES)
◽
10.1109/ines.2013.6632823
◽
2013
◽
Author(s):
M. Kozlovszky
◽
L. Kovacs
◽
M. Torocsik
◽
G. Windisch
◽
S. Acs
◽
...
Keyword(s):
Cloud Security
◽
Security Monitoring
◽
Vulnerability Management
Download Full-text
Cloud Security Monitoring and Vulnerability Management
Topics in Intelligent Engineering and Informatics - Critical Infrastructure Protection Research
◽
10.1007/978-3-319-28091-2_11
◽
2016
◽
pp. 123-139
◽
Cited By ~ 2
Author(s):
M. Kozlovszky
Keyword(s):
Cloud Security
◽
Security Monitoring
◽
Vulnerability Management
Download Full-text
SLA-Based Cloud Security Monitoring: Challenges, Barriers, Models and Methods
Lecture Notes in Computer Science - Euro-Par 2014: Parallel Processing Workshops
◽
10.1007/978-3-319-14325-5_31
◽
2014
◽
pp. 359-370
◽
Cited By ~ 8
Author(s):
Dana Petcu
Keyword(s):
Cloud Security
◽
Security Monitoring
Download Full-text
Cloud Slicing a new architecture for cloud security monitoring
2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)
◽
10.1109/pacrim.2015.7334802
◽
2015
◽
Cited By ~ 1
Author(s):
Abdulaziz Aldribi
◽
Issa Traore
◽
Gabriel Letourneau
Keyword(s):
Cloud Security
◽
Security Monitoring
Download Full-text
The role of recollection in high-confidence know judgments
PsycEXTRA Dataset
◽
10.1037/e520592012-515
◽
2010
◽
Author(s):
Laura Mickes
◽
Vivian Hwe
◽
John T. Wixted
Keyword(s):
High Confidence
Download Full-text
Egyptian researchers decry ‘security monitoring’
Nature Middle East
◽
10.1038/nmiddleeast.2016.97
◽
2016
◽
Cited By ~ 1
Author(s):
Nadia El-Awady
Keyword(s):
Security Monitoring
Download Full-text
Analysis and design of intelligent NIPS based on cloud security
Information Management and Management Engineering
◽
10.2495/imme140111
◽
2014
◽
Author(s):
Tiejun Jia
◽
Ximing Xiao
◽
Fujie Zhang
◽
Zhaohong Feng
Keyword(s):
Cloud Security
◽
Analysis And Design
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close