Results 251 to 260 of about 514,554 (290)
Some of the next articles are maybe not open access.
Intrusion Detection System for Cloud Environment
Proceedings of the 7th International Conference on Security of Information and Networks, 2014Cloud computing environment is threatened by different types of cyber-attacks. This paper presents an implementation of intrusion detection system to secure virtualized servers on the cloud platform and validates intrusion detection system in detecting DDoS attack against the virtualized environment.
Hifaa Bait Baraka, Huaglory Tianfield
openaire +2 more sources
Proceedings of the first Workshop on Emerging Technologies for software-defined and reconfigurable hardware-accelerated Cloud Datacenters, 2017
Cloud computing is an important infrastructure for many enterprises. After 10 years of development, cloud computing has achieved a great success, and has greatly changed the economy, society, science and industries. In particular, with the rapid development of mobile Internet and big data technology, almost all of the online services and data services ...
openaire +1 more source
Cloud computing is an important infrastructure for many enterprises. After 10 years of development, cloud computing has achieved a great success, and has greatly changed the economy, society, science and industries. In particular, with the rapid development of mobile Internet and big data technology, almost all of the online services and data services ...
openaire +1 more source
Detection and/or distinction between haze and/or cloud
2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), 2015The concentration of air pollutants has become severe, and influence of biomass burning aerosols (BBA) generated by agricultural biomass burning (ABB) has been noted upon the severe haze episodes. This work intends to show the retrieval algorithm as far as heavy air pollution caused by ABB is concerned.
Sonoyo Mukai, Itaru Sano, Makiko Nakata
openaire +1 more source
Cloud Resource Monitoring for Intrusion Detection
2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013We present a novel security monitoring framework for intrusion detection in IaaS cloud infrastructures. The framework uses statistical anomaly detection techniques over data monitored both inside and outside each Virtual Machine instance. We present the architecture of our monitoring framework and describe the implementation of the real-time monitors ...
Sijin He +3 more
openaire +1 more source
Detecting Denial of Service Attacks in the Cloud
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2016In this paper, an approach to protecting virtual machines (VMs) against denial of service (DoS) attacks in a cloud environment is proposed. An open source cloud computing platform (Eucalyptus) has been deployed, and experimentation was carried out on this setup. We investigate attacks emanating from one or more virtual machines (VMs) to another VM in a
Raneel Kumar +2 more
openaire +1 more source
On detection and tracking of variant phenomena clouds
ACM Transactions on Sensor Networks, 2014Phenomena clouds are characterized by nondeterministic, dynamic variations of shapes, sizes, direction, and speed of motion along multiple axes. The phenomena detection and tracking should not be limited to some traditional applications such as oil spills and gas clouds but also be utilized to more accurately observe other types of phenomena such as ...
My T. Thai +3 more
openaire +1 more source
Insider threat detection model for the cloud
2013 Information Security for South Africa, 2013Cloud computing is a revolutionary technology that is changing the way people and organizations conduct business. It promises to help organizations save money on IT expenditure while increasing reliability, efficiency and productivity. However, despite the potential benefits that the cloud promises its users, it is facing some security challenges ...
Lucky Nkosi +2 more
openaire +1 more source
Learning to detect misaligned point clouds
Journal of Field Robotics, 2017AbstractMatching and merging overlapping point clouds is a common procedure in many applications, including mobile robotics, three‐dimensional mapping, and object visualization. However, fully automatic point‐cloud matching, without manual verification, is still not possible because no matching algorithms exist today that can provide any certain ...
Håkan Almqvist +3 more
openaire +1 more source
The Cloud Detectability Conundrum
SAE Technical Paper Series, 2019<div class="section abstract"><div class="htmlview paragraph">Since the beginning of aviation, aircraft designers, researchers, and pilots have monitored the skies looking for clouds to determine when and where to fly as well as when to deice aircraft surfaces.
openaire +1 more source
Termination detection in cloud
International Journal of System Assurance Engineering and Management, 2023Bharati Sinha +2 more
openaire +1 more source

