Vulnerabilities and mitigation techniques toning in the cloud (Englisch)
- Neue Suche nach: Zineddine, Mhamed
- Neue Suche nach: Zineddine, Mhamed
In:
Computers & security
;
48
;
1-18
;
2015
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Vulnerabilities and mitigation techniques toning in the cloud
-
Beteiligte:Zineddine, Mhamed ( Autor:in )
-
Erschienen in:Computers & security ; 48 ; 1-18
-
Verlag:
- Neue Suche nach: Elsevier Science B.V., Amsterdam.
-
Erscheinungsdatum:01.01.2015
-
Format / Umfang:18 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.805
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 005.805 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 48
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Vulnerabilities and mitigation techniques toning in the cloudZineddine, Mhamed et al. | 2014
- 1
-
Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flightsMhamed Zineddine et al. | 2015
- 19
-
Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security ExtensionMesquida, Antoni Lluís / Mas, Antonia et al. | 2014
- 35
-
Combating advanced persistent threats: From network event correlation to incident detectionFriedberg, Ivo / Skopik, Florian / Settanni, Giuseppe / Fiedler, Roman et al. | 2014
- 58
-
On the limits of engine analysis for cheating detection in chessBarnes, David J. / Hernandez-Castro, Julio et al. | 2014
- 74
-
Exfiltrating data from Android devicesDo, Quang / Martini, Ben / Choo, Kim-Kwang Raymond et al. | 2014
- 92
-
Managing XACML systems in distributed environments through Meta-PoliciesDíaz-López, Daniel / Dólera-Tormo, Ginés / Gómez-Mármol, Félix / Martínez-Pérez, Gregorio et al. | 2014
- 116
-
Towards complexity analysis of User Authorization Query problem in RBACLu, Jianfeng / Joshi, James B.D. / Jin, Lei / Liu, Yiding et al. | 2014
- 131
-
A data hiding scheme using pixel value differencing and improving exploiting modification directionsShen, Shu-Yuan / Huang, Li-Hong et al. | 2014
- 142
-
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applicationsLin, Xi-Jun / Sun, Lin / Qu, Haipeng et al. | 2014
- 150
-
Authentication graphs: Analyzing user behavior within an enterprise networkKent, Alexander D. / Liebrock, Lorie M. / Neil, Joshua C. et al. | 2014
- 167
-
Transaction authentication using complementary colorsMaeng, YoungJae / Mohaisen, Aziz / Lee, Mun-Kyu / Nyang, DaeHun et al. | 2014
- 182
-
The professionalisation of information security: Perspectives of UK practitionersReece, R.P. / Stahl, B.C. et al. | 2014
- 196
-
Leakage-resilient password entry: Challenges, design, and evaluationYan, Qiang / Han, Jin / Li, Yingjiu / Zhou, Jianying / Deng, Robert H. et al. | 2014
- 212
-
A framework for metamorphic malware analysis and real-time detectionAlam, Shahid / Horspool, R.Nigel / Traore, Issa / Sogukpinar, Ibrahim et al. | 2014
- 234
-
Deceiving entropy based DoS detectionÖzçelik, İlker / Brooks, Richard R. et al. | 2014
- 246
-
Detection of malicious PDF files and directions for enhancements: A state-of-the art surveyNissim, Nir / Cohen, Aviad / Glezer, Chanan / Elovici, Yuval et al. | 2014
- 267
-
Measuring user satisfaction with information security practicesMontesdioca, Gustavo Percio Zimmermann / Maçada, Antônio Carlos Gastaud et al. | 2014
- 281
-
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approachDang-Pham, Duy / Pittayachawan, Siddhi et al. | 2014
- IFC
-
Editorial Board| 2014
- iii
-
Contents| 2014