Open Access
Issue
E3S Web Conf.
Volume 472, 2024
International Conference on Renewable Energy, Green Computing and Sustainable Development (ICREGCSD 2023)
Article Number 02009
Number of page(s) 9
Section Green Computing
DOI https://doi.org/10.1051/e3sconf/202447202009
Published online 05 January 2024
  1. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” ACM Comm., vol. 53, no. 4, pp. 50–58, Apr. 2010. [CrossRef] [Google Scholar]
  2. C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in cloud,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, 2013 [CrossRef] [Google Scholar]
  3. Karen Scarfone, Murugiah Souppaya, Paul Hoffman (2011), “Guide to Security for Full Virtualization Technologies”, Computer security NIST Special Publication 800–125. [Google Scholar]
  4. Chun-Jen Chung, Tianyi Xing (2013), “NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems”, IEEE transactions on dependable and secure computing, vol. 10, no. 4 [Google Scholar]
  5. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, “BotHunter: Detecting Malware Infection through IDS-driven Dialog Correlation,” Proc. 16th USENIX Security Symp. (SS ‘ 07), pp. 12:1–12:16, Aug. 2007. [Google Scholar]
  6. G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic,” Proc. 15th Ann. Network and Distributed System Security Symp. (NDSS ‘ 08), Feb. 2008. [Google Scholar]
  7. M. Jaiganesh and A. Kumar, Fuzzy ART based User behaviour trust in cloud computing, Adv. Soft Comput. 324 (2014) 341–348, 2016. [Google Scholar]
  8. P. Ammann, D. Wijesekera, and S. Kaushik, “Scalable, graph based network vulnerability analysis,” Proc. 9th ACM Conf. Computer and Comm. Security (CCS ‘ 02), pp. 217–224, 2002. [CrossRef] [Google Scholar]
  9. X. Ou, W.F. Boyer, and M.A. McQueen, “A Scalable Approach to Attack Graph Generation,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS ‘ 06), pp. 336–345, 2006. [Google Scholar]
  10. X. Ou, S. Govindavajhala, and A.W. Appel, “MulVAL: A Logic- Based Network Security Analyzer,” Proc. 14th USENIX Security Symp., pp. 113–128, 2005. [Google Scholar]
  11. Mitre Corporation, “Common Vulnerabilities and Exposures, CVE,” http://cve.mitre.org/, 2012. [Google Scholar]
  12. National Institute of Standards and Technology, “National Vulnerability Database, NVD,” http://nvd.nist.gov, 2012. [Google Scholar]
  13. Gutjahr, W.J.: Aco algorithms with guaranteed convergence to the optimal solution. Information Processing Letters 82 (3), 145–153 (2002) [CrossRef] [Google Scholar]
  14. Nishant, K. Sharma, P., Krishna, V., “Load Balancing of Nodes in cloud using Ant Colony Optimization”, Computer Modeling and Simulation, 14th International Conference on 28-30 March 2012, 3–88 [Google Scholar]
  15. Stutzle, T., Dorigo, M.: A short convergence proof for a class of ant colony optimization algorithms. IEEE Transactions on Evolutionary Computation 2002, 358–336 (2002). [CrossRef] [Google Scholar]
  16. Ghosh, N., Nanda, S., Ghosh, S.K. (2010). An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment. In: Kant, K., Pemmaraju, S.V., Sivalingam, K.M., Wu, J. (eds) Distributed Computing and Networking. ICDCN 2010. Lecture Notes in Computer Science, Vol. 5935, 509–520. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.