Collaborative cloud IDS in detecting denial of service by dendritic cell mechanism
The term Cloud computing is not new in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunity in data protection mechanisms...
| Main Authors: | Ahmad, Azuan, Kama, Mohd Nazri, Azmi, Azri, Idris, Norbik Bashah |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
International Journal of Electrical and Electronic Engineering & Telecommunications
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/69598/ http://irep.iium.edu.my/69598/13/69598_Collaborative%20Cloud%20IDS%20in%20Detecting%20Denial_article.pdf http://irep.iium.edu.my/69598/7/69598_Collaborative%20cloud%20IDS%20in%20detecting%20denial%20of%20service%20by%20dendritic%20cell%20mechanism_scopus.pdf |
Similar Items
Cloud co-residency denial of service threat detection
inspired by artificial immune system
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Cloud denial of service detection by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Collaborative learning, using Facebook's page and Groups
by: Ataie, Farib, et al.
Published: (2015)
by: Ataie, Farib, et al.
Published: (2015)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
by: Islam, Thouhedul, et al.
Published: (2017)
by: Islam, Thouhedul, et al.
Published: (2017)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Detecting false messages in the smartphone fault reporting system
by: Rajoo, Sharmiladevi, et al.
Published: (2020)
by: Rajoo, Sharmiladevi, et al.
Published: (2020)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
A security-based survey and classification of cloud architectures, state of the art and future directions
by: Waqas, Ahmad, et al.
Published: (2013)
by: Waqas, Ahmad, et al.
Published: (2013)
International collaboration in information and communication technology of Malaysian scholars
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
by: Abu Bakar, Ahmad Bakeri, et al.
Published: (2013)
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
Mathematical modeling using coordination mechanisms for multi-agent systems in service oriented architecture
by: Muhamad Ibrahim, Najhan
Published: (2019)
by: Muhamad Ibrahim, Najhan
Published: (2019)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
A case study on the adoption of cloud computing in Malaysia from the perspectives of cloud providers
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
by: Mohamad Puad, Noor Hazwani, et al.
Published: (2019)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework
by: Rind, M. Malook, et al.
Published: (2015)
by: Rind, M. Malook, et al.
Published: (2015)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
Using lexical ontology for semi-automatic logical data warehouse design
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan
by: Rind, M. M., et al.
Published: (2016)
by: Rind, M. M., et al.
Published: (2016)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Application service delivery in the modern virtualized data center-improving reliability and scalability
by: Raza, A, et al.
Published: (2016)
by: Raza, A, et al.
Published: (2016)
Interactive multi-media applications: quality of service
guaranteed under huge traffic
by: Yalli, Jameel, et al.
Published: (2014)
by: Yalli, Jameel, et al.
Published: (2014)
Factors effecting fixed-line telecom services customer retention: A study of Pakistan
by: Rind, M. Malook, et al.
Published: (2016)
by: Rind, M. Malook, et al.
Published: (2016)
A comprehensive comparative study of MOM for adaptive interoperability communications in service oriented architecture
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
Literature Survey on Enhancement of MOM for Intelligent Cross-Platform Communications in Service Oriented Architecture
by: Muhamad Ibrahim, Najhan
Published: (2018)
by: Muhamad Ibrahim, Najhan
Published: (2018)
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia
by: Zamzami, Ikhlas, et al.
Published: (2016)
by: Zamzami, Ikhlas, et al.
Published: (2016)
Detection of vascular intersection in retina fundus
by: Iqbal, Muhammad Imran, et al.
Published: (2008)
by: Iqbal, Muhammad Imran, et al.
Published: (2008)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
Service redundancy and cluster-based routing protocols for wireless sensor and mobile ad hoc networks: a survey
by: Yagoub, Mudathir F.S., et al.
Published: (2020)
by: Yagoub, Mudathir F.S., et al.
Published: (2020)
Enhancement of fast pedestrian detection using HOG features
by: Baghdadi, Ahmad, et al.
Published: (2015)
by: Baghdadi, Ahmad, et al.
Published: (2015)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Similar Items
-
Cloud co-residency denial of service threat detection
inspired by artificial immune system
by: Ahmad, Azuan, et al.
Published: (2018) -
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018) -
Cloud denial of service detection by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2018) -
Collaborative learning, using Facebook's page and Groups
by: Ataie, Farib, et al.
Published: (2015) -
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)