Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications"
written by Arif Sari,
published by Journal of Information Security, Vol.6 No.2, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Study of Various Intrusion Detection Systems: A Survey
2021
[2] Qualitative Data Clustering to Detect Outliers
2021
[3] Authentication, Access Control, VM Allocation and Energy efficiency towards Securing Computing Environments in Cloud Computing
2021
[4] A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack
2021
[5] Malware Detection: Issues and Challenges
2021
[6] An efficient intrusion detection system by using behaviour profiling and statistical approach model.
2021
[7] DevSecOps of Containerization
2020
[8] Ensemble Learning for Detecting Attacks and Anomalies in IoT Smart Home
2020
[9] Smart anomaly detection in sensor systems: A multi-perspective review
2020
[10] A SURVEY OF CLOUD NETWORK ANALYTICS
2020
[11] ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE FOR MOBILE NETWORK OPERATORS
2020
[12] A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
2020
[13] Estrazione di relazioni semantiche frequenti tra oggetti in immagini segmentate
2020
[14] Machine learning threatens 5G security
2020
[15] Anomaly Detection Methods for Categorical Data: A Review
2019
[16] A Collective Anomaly Detection Approach for Multidimensional Streams in Mobile Service Security
2019
[17] Data Discovery and Anomaly Detection Using Atypicality for Real-Valued Data
2019
[18] CloudDet: Interactive Visual Analysis of Anomalous Performances in Cloud Computing Systems
2019
[19] Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things
2019
[20] A SURVEY: CLOUD BASED STORAGE SECURITY "DROPBOX"
Sci.Int.(Lahore), 2019
[21] On the Security of A Remote Cloud Storage Integrity Checking Protocol
2019
[22] Data protection in cloud computing:: A Survey of the State-of-Art
2019
[23] Anomaly Detection and Processing in Artificial Intelligence for IT Operations of Power System
2019
[24] Why is this an anomaly? Explaining anomalies using sequential explanations
2019
[25] Anomaly Detection for Network Traffic Data
2018
[26] Secure Fuzzy Logic to Study the Impact of Knowledge Management Enablers on Organizational Performance through Decision Making Mediator
2018
[27] Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology.
2018
[28] Fault tolerance in embedded systems: cloud computing systems
2018
[29] Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems
2018
[30] Ransomware early detection by the analysis of file sharing traffic
Journal of Network and Computer Applications, 2018
[31] Intrusion Detection Techniques in Cloud Computing: A
International Journal of Computer Applications, 2018
[32] Anomaly Detection sui Sistemi Monitorati dall'Oracle Enterprise Manager
2018
[33] Evaluation of Routing Protocols on Ad Hoc Network Modelling from Medical Data using OpNet Simulation
2017
[34] The Blockchain: Overview of Past and Future
Transactions on Networks and Communications, 2017
[35] The Dark Side of the China: The Government, Society and the Great Cannon
2017
[36] Exploiting Cryptocurrency Miners with OISNT Techniques
2017
[37] TNC
2017
[38] The Homomorphic Encryption Method for Cloud Computing Storage Security
2017
[39] Optimalizace algoritmů a DatovýCH Struktur Pro VyhledáVání ReguláRníCH VýRazů S VyužITíM Technologie FPGA; Optimization of Algorithms and Data …
2016
[40] Pheromone-Based Genetic Algorithm Adaptive Selection Algorithm in Cloud Storage
2016
[41] IMPACT OF CLOUD STORAGE SERVICES ON ORGANIZATIONS
International Conference on Research in Education and Science, 2016
[42] Optimization of algorithms and data structures for regular expression matching using FPGA technology
Dissertation, 2016
[43] Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems
Future Generation Computer Systems, 2016
[44] Research on Cloud Security Risk Assessment based on Fuzzy Entropy Weight Model
2016
[45] Research on the Method of Cloud Computing Storage Security based on the Homomorphic Encryption Method
2016
[46] Extension of Kerberos with X. 509 and Integration of Elliptic Curve Cryptography in Authentication
2016
[47] Performance analysis of anomaly detection of different IoT datasets using cloud micro services
2016
[48] Towards Data Driven Process Control in Manufacturing Car Body Parts
2016
[49] Security and Optimization Challenges of Green Data Centers
International Journal of Communications, Network and System Sciences, 2015
[50] Fault Tolerance Mechanisms in Distributed Systems
International Journal of Communications, Network and System Sciences, 2015
[51] Comparative Analysis of Wireless Security Protocols: WEP vs WPA
International Journal of Communications, Network and System Sciences, 2015
[52] Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
2015
[53] Dissemination of Information Communication Technologies: Mobile Government Practices in Developing States
International Journal of Communications, Network and System Sciences, 2015
[54] Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
International Journal of Communications, Network and System Sciences, 2015
[55] Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite
International Journal of Communications, Network and System Sciences, 2015
Free SCIRP Newsletters
Copyright © 2006-2023 Scientific Research Publishing Inc. All Rights Reserved.
Top