G.3.5. Systems
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

M. Rezvani

Volume 6, Issue 2 , July 2018, , Pages 387-397

https://doi.org/10.22044/jadm.2017.5581.1668

Abstract
  Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional ...  Read More