Results 251 to 260 of about 514,554 (290)
Some of the next articles are maybe not open access.

Intrusion Detection System for Cloud Environment

Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Cloud computing environment is threatened by different types of cyber-attacks. This paper presents an implementation of intrusion detection system to secure virtualized servers on the cloud platform and validates intrusion detection system in detecting DDoS attack against the virtualized environment.
Hifaa Bait Baraka, Huaglory Tianfield
openaire   +2 more sources

Anomaly Detection in Clouds

Proceedings of the first Workshop on Emerging Technologies for software-defined and reconfigurable hardware-accelerated Cloud Datacenters, 2017
Cloud computing is an important infrastructure for many enterprises. After 10 years of development, cloud computing has achieved a great success, and has greatly changed the economy, society, science and industries. In particular, with the rapid development of mobile Internet and big data technology, almost all of the online services and data services ...
openaire   +1 more source

Detection and/or distinction between haze and/or cloud

2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), 2015
The concentration of air pollutants has become severe, and influence of biomass burning aerosols (BBA) generated by agricultural biomass burning (ABB) has been noted upon the severe haze episodes. This work intends to show the retrieval algorithm as far as heavy air pollution caused by ABB is concerned.
Sonoyo Mukai, Itaru Sano, Makiko Nakata
openaire   +1 more source

Cloud Resource Monitoring for Intrusion Detection

2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
We present a novel security monitoring framework for intrusion detection in IaaS cloud infrastructures. The framework uses statistical anomaly detection techniques over data monitored both inside and outside each Virtual Machine instance. We present the architecture of our monitoring framework and describe the implementation of the real-time monitors ...
Sijin He   +3 more
openaire   +1 more source

Detecting Denial of Service Attacks in the Cloud

2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2016
In this paper, an approach to protecting virtual machines (VMs) against denial of service (DoS) attacks in a cloud environment is proposed. An open source cloud computing platform (Eucalyptus) has been deployed, and experimentation was carried out on this setup. We investigate attacks emanating from one or more virtual machines (VMs) to another VM in a
Raneel Kumar   +2 more
openaire   +1 more source

On detection and tracking of variant phenomena clouds

ACM Transactions on Sensor Networks, 2014
Phenomena clouds are characterized by nondeterministic, dynamic variations of shapes, sizes, direction, and speed of motion along multiple axes. The phenomena detection and tracking should not be limited to some traditional applications such as oil spills and gas clouds but also be utilized to more accurately observe other types of phenomena such as ...
My T. Thai   +3 more
openaire   +1 more source

Insider threat detection model for the cloud

2013 Information Security for South Africa, 2013
Cloud computing is a revolutionary technology that is changing the way people and organizations conduct business. It promises to help organizations save money on IT expenditure while increasing reliability, efficiency and productivity. However, despite the potential benefits that the cloud promises its users, it is facing some security challenges ...
Lucky Nkosi   +2 more
openaire   +1 more source

Learning to detect misaligned point clouds

Journal of Field Robotics, 2017
AbstractMatching and merging overlapping point clouds is a common procedure in many applications, including mobile robotics, three‐dimensional mapping, and object visualization. However, fully automatic point‐cloud matching, without manual verification, is still not possible because no matching algorithms exist today that can provide any certain ...
Håkan Almqvist   +3 more
openaire   +1 more source

The Cloud Detectability Conundrum

SAE Technical Paper Series, 2019
<div class="section abstract"><div class="htmlview paragraph">Since the beginning of aviation, aircraft designers, researchers, and pilots have monitored the skies looking for clouds to determine when and where to fly as well as when to deice aircraft surfaces.
openaire   +1 more source

Termination detection in cloud

International Journal of System Assurance Engineering and Management, 2023
Bharati Sinha   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy