How to distribute the detection load among virtual machines to maximize the detection of distributed attacks in the cloud?
Security has been identified to be the principal stumbling-block preventing users and enterprises from moving their businesses to the cloud. The reason is that cloud systems, besides inheriting all the vulnerabilities of the traditional computing systems, appeal to new types of threats engendered ma...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , , |
| Format: | conferenceObject |
| Published: |
2017
|
| Online Access: | http://hdl.handle.net/10725/5340 http://dx.doi.org/10.1109/SCC.2016.48 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://ieeexplore.ieee.org/abstract/document/7557468/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|