"A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications"
written by Arif Sari,
published by Journal of Information Security, Vol.6 No.2, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Data Discovery and Anomaly Detection Using Atypicality for Real-Valued Data
2019
[2] Secure Fuzzy Logic to Study the Impact of Knowledge Management Enablers on Organizational Performance through Decision Making Mediator
2018
[3] Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology.
2018
[4] Fault tolerance in embedded systems: cloud computing systems
2018
[5] Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems
2018
[6] Ransomware early detection by the analysis of file sharing traffic
Journal of Network and Computer Applications, 2018
[7] Intrusion Detection Techniques in Cloud Computing: A
International Journal of Computer Applications, 2018
[8] Anomaly Detection sui Sistemi Monitorati dall'Oracle Enterprise Manager
2018
[9] Evaluation of Routing Protocols on Ad Hoc Network Modelling from Medical Data using OpNet Simulation
2017
[10] The Blockchain: Overview of Past and Future
Transactions on Networks and Communications, 2017
[11] The Dark Side of the China: The Government, Society and the Great Cannon
2017
[12] Exploiting Cryptocurrency Miners with OISNT Techniques
2017
[13] TNC
2017
[14] IMPACT OF CLOUD STORAGE SERVICES ON ORGANIZATIONS
International Conference on Research in Education and Science, 2016
[15] Optimization of algorithms and data structures for regular expression matching using FPGA technology
Dissertation, 2016
[16] Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems
Future Generation Computer Systems, 2016
[17] Research on Cloud Security Risk Assessment based on Fuzzy Entropy Weight Model
2016
[18] Research on the Method of Cloud Computing Storage Security based on the Homomorphic Encryption Method
2016
[19] Extension of Kerberos with X. 509 and Integration of Elliptic Curve Cryptography in Authentication
2016
[20] Performance analysis of anomaly detection of different IoT datasets using cloud micro services
2016
[21] Towards Data Driven Process Control in Manufacturing Car Body Parts
2016
[22] Security and Optimization Challenges of Green Data Centers
International Journal of Communications, Network and System Sciences, 2015
[23] Fault Tolerance Mechanisms in Distributed Systems
International Journal of Communications, Network and System Sciences, 2015
[24] Comparative Analysis of Wireless Security Protocols: WEP vs WPA
International Journal of Communications, Network and System Sciences, 2015
[25] Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
2015
[26] Dissemination of Information Communication Technologies: Mobile Government Practices in Developing States
International Journal of Communications, Network and System Sciences, 2015
[27] Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
International Journal of Communications, Network and System Sciences, 2015
[28] Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite
International Journal of Communications, Network and System Sciences, 2015