How to distribute the detection load among virtual machines to maximize the detection of distributed attacks in the cloud?

Security has been identified to be the principal stumbling-block preventing users and enterprises from moving their businesses to the cloud. The reason is that cloud systems, besides inheriting all the vulnerabilities of the traditional computing systems, appeal to new types of threats engendered ma...

Full description

Saved in:
Bibliographic Details
Main Author: Abdel Wahab, Omar (author)
Other Authors: Bentahar, Jamal (author), Otrok, Hadi (author), Mourad, Azzam (author)
Format: conferenceObject
Published: 2017
Online Access:http://hdl.handle.net/10725/5340
http://dx.doi.org/10.1109/SCC.2016.48
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://ieeexplore.ieee.org/abstract/document/7557468/
Tags: Add Tag
No Tags, Be the first to tag this record!