IDPS: an integrated intrusion handling model for cloud computing environment
Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cos...
| Main Authors: | Alsafi, Hassen Mohammed, Abduallah, Wafaa Mustafa, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Science Press, Serials Publications, New Delhi
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/22263/ http://irep.iium.edu.my/22263/4/1_Hassen_Mohammed_Alsafi.pdf |
Similar Items
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018)
by: Al-Zarqawee, Aws Naser
Published: (2018)
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Data hiding within color images based on MCT with x-or operations
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
A pay-and-stay model for tackling intruders in hybrid wireless mesh networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Where is the intelligence in computational intelligence?
by: Pathan, Al-Sakib Khan
Published: (2005)
by: Pathan, Al-Sakib Khan
Published: (2005)
Molecular docking
by: Abduallah Alsafi, Hassen Mohammed, et al.
Published: (2011)
by: Abduallah Alsafi, Hassen Mohammed, et al.
Published: (2011)
On the vital areas of intrusion detection systems in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2012)
by: Abduvaliyev, Abror, et al.
Published: (2012)
Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
by: Leow, Yu Hong
Published: (2024)
by: Leow, Yu Hong
Published: (2024)
Emerging sensor-cloud technology for pervasive services and applications
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
An integrated model to evaluate the effects of cloud computing services on SMEs performance
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Multi-dimensional networking and distributed computing services
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013)
by: Abawajy, Jemal H., et al.
Published: (2013)
An integrated model for continuance use of cloud computing services towards SMEs organizational performance
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Similar Items
-
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017) -
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015) -
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013) -
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014) -
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)