Skip to content
VuFind
Advanced
  • Cloud-Based Intrusion Detectio...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
QR Code

Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions

Mobile cloud computing (MCC) allows smart mobile devices (SMD) to access the cloud resources in order to offload data from smartphones and to acquire computational services for application processing. A distinctive factor in accessing cloud resources is the communication link. However, the communica...

Full description

Bibliographic Details
Main Authors: Zakira, Inayat, Abdullah, Gani, Nor Badrul, Anuar, Shahid, Anwar, Muhammad Khurram , Khan
Format: Article
Language:English
English
Published: Springer 2017
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/17196/
http://umpir.ump.edu.my/id/eprint/17196/1/Cloud-Based%20Intrusion%20Detection%20and%20Response%20System_Open%20Research%20Issues%2C%20and%20Solutions-Abstract.pdf
http://umpir.ump.edu.my/id/eprint/17196/7/Cloud-Based%20Intrusion%20Detection%20and%20Response%20System_Open%20Research%20Issues%2C%20and%20Solutions.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/17196/
http://umpir.ump.edu.my/id/eprint/17196/1/Cloud-Based%20Intrusion%20Detection%20and%20Response%20System_Open%20Research%20Issues%2C%20and%20Solutions-Abstract.pdf
http://umpir.ump.edu.my/id/eprint/17196/7/Cloud-Based%20Intrusion%20Detection%20and%20Response%20System_Open%20Research%20Issues%2C%20and%20Solutions.pdf

Similar Items

  • Intrusion Response Systems: Foundations, Design, and Challenges
    by: Zakira, Inayat, et al.
    Published: (2016)
  • From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
    by: Shahid, Anwar, et al.
    Published: (2017)
  • Response Option for Attacks Detected by Intrusion Detection System
    by: Shahid, Anwar, et al.
    Published: (2015)
  • A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
    by: Shahid, Anwar, et al.
    Published: (2014)
  • Research issues in adaptive intrusion detection
    by: Zainal, Anazida, et al.
    Published: (2006)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips