Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications"
written by Arif Sari,
published by Journal of Information Security, Vol.6 No.2, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A survey of anomaly detection techniques
Banby, AS El-Fishawy… - Journal of Optics, 2024
[2] Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection
2023
[3] Enhancing Cloud Security Posture for Ubiquitous Data Access with a Cybersecurity Framework Based Management Tool
2023 IEEE 14th Annual …, 2023
[4] A Fine‐Grained Medical Data Sharing Scheme with Ciphertext Reencryption
Wireless Communications and …, 2022
[5] Cloud security aspects using homomorphic encryption: a review
Res J Eng Technol Med Sci, 2022
[6] A Network Traffic Network Prediction Model with K‐Means Optimization Algorithm
Mobile Information Systems, 2022
[7] Challenges In Cloud Anomaly Detection Using Machine Learning Approaches
2022 Fourth International Conference …, 2022
[8] A stacked ensemble method with adaptive attribute selection to detect ddos attack in cloud-assisted wban
International Conference on …, 2022
[9] Swarm Intelligence Based Data Selection Mechanism for Reputation Generation in Social Cloud
… on Machine Learning, Big Data, Cloud …, 2022
[10] Efficient Integrity Checking and Secured Data Sharing in Cloud
… International Conference on …, 2022
[11] Intrusion detection systems in the cloud computing: a comprehensive and deep literature review
… : Practice and Experience, 2022
[12] Automation of cleaning and ensembles for outliers detection in questionnaire data
Expert Systems with Applications, 2022
[13] Eğitimin Dijital Boyutunda Öğrenme-Öğretme Araçları
International Journal of Karamanoglu Mehmetbey Educational Research, 2022
[14] Dimensionality Reduction Based Intrusion Detection System in Cloud Computing Environment Using Machine Learning
International Journal of Information and …, 2022
[15] The Impact of Cloud Computing on Cybersecurity Threat Hunting and Threat Intelligence Sharing: Data Security, Data Sharing, and Collaboration
International Journal of Computer Applications …, 2022
[16] Security and privacy in cloud computing: technical review
Future Internet, 2022
[17] A systematic literature review of intrusion detection systems in the cloud‐based IoT environments
… and Computation: Practice …, 2022
[18] Robustness improvement of component-based cloud computing systems
The Journal of …, 2022
[19] A Fine-Grained Medical Data Sharing Scheme with Ciphertext Reencryption
Wireless Communications and Mobile …, 2022
[20] A Network Traffic Network Prediction Model with K-Means Optimization Algorithm
Mobile Information Systems, 2022
[21] Anomaly symptom recognition in distributed IT systems
2021
[22] The Use2Use Design Toolkit—Tools for User-Centred Circular Design
Sustainability, 2021
[23] DAM: a theoretical framework for SensorSecurity in IoT applications
International Journal of Next-Generation …, 2021
[24] A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack
2021
[25] Study of Various Intrusion Detection Systems: A Survey
2021
[26] Qualitative Data Clustering to Detect Outliers
2021
[27] Authentication, Access Control, VM Allocation and Energy efficiency towards Securing Computing Environments in Cloud Computing
2021
[28] Malware Detection: Issues and Challenges
2021
[29] An efficient intrusion detection system by using behaviour profiling and statistical approach model.
2021
[30] Deep learning for anomaly detection in time-series data: review, analysis, and guidelines
IEEE Access, 2021
[31] The hindrance of cloud computing acceptance within the financial sectors in Germany
Information & Computer Security, 2021
[32] Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
Journal of Information …, 2021
[33] Real-Time QoS Monitoring and Anomaly Detection on Microservice-based Applications in Cloud-Edge Infrastructure
2021
[34] Détection de comportements et identification de rôles dans les réseaux sociaux
2021
[35] Cloud Computing Anomaly and Threat Detection Using Big Data Analytics and Machine Learning
2020
[36] DevSecOps of Containerization
2020
[37] Ensemble Learning for Detecting Attacks and Anomalies in IoT Smart Home
2020
[38] Smart anomaly detection in sensor systems: A multi-perspective review
2020
[39] A SURVEY OF CLOUD NETWORK ANALYTICS
2020
[40] ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE FOR MOBILE NETWORK OPERATORS
2020
[41] A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
2020
[42] Estrazione di relazioni semantiche frequenti tra oggetti in immagini segmentate
2020
[43] Machine learning threatens 5G security
2020
[44] Anomaly Detection Methods for Categorical Data: A Review
2019
[45] A Collective Anomaly Detection Approach for Multidimensional Streams in Mobile Service Security
2019
[46] Data Discovery and Anomaly Detection Using Atypicality for Real-Valued Data
2019
[47] CloudDet: Interactive Visual Analysis of Anomalous Performances in Cloud Computing Systems
2019
[48] Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things
2019
[49] A SURVEY: CLOUD BASED STORAGE SECURITY "DROPBOX"
Sci.Int.(Lahore), 2019
[50] On the Security of A Remote Cloud Storage Integrity Checking Protocol
2019
[51] Data protection in cloud computing:: A Survey of the State-of-Art
2019
[52] Anomaly Detection and Processing in Artificial Intelligence for IT Operations of Power System
2019
[53] Why is this an anomaly? Explaining anomalies using sequential explanations
2019
[54] Anomaly Detection for Network Traffic Data
2018
[55] Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology.
2018
[56] Fault tolerance in embedded systems: cloud computing systems
2018
[57] Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems
2018
[58] Ransomware early detection by the analysis of file sharing traffic
Journal of Network and Computer Applications, 2018
[59] Intrusion Detection Techniques in Cloud Computing: A
International Journal of Computer Applications, 2018
[60] Anomaly Detection sui Sistemi Monitorati dall'Oracle Enterprise Manager
2018
[61] Secure Fuzzy Logic to Study the Impact of Knowledge Management Enablers on Organizational Performance through Decision Making Mediator
2018
[62] Anomaly Detection sui Sistemi Monitorati dall'Oracle Enterprise Manager= Anomaly Detection on Targets Monitored by Oracle Enterprise Manager
2018
[63] Evaluation of Routing Protocols on Ad Hoc Network Modelling from Medical Data using OpNet Simulation
2017
[64] The Blockchain: Overview of Past and Future
Transactions on Networks and Communications, 2017
[65] The Dark Side of the China: The Government, Society and the Great Cannon
2017
[66] Exploiting Cryptocurrency Miners with OISNT Techniques
2017
[67] TNC
2017
[68] The Homomorphic Encryption Method for Cloud Computing Storage Security
2017
[69] Optimalizace algoritmů a DatovýCH Struktur Pro VyhledáVání ReguláRníCH VýRazů S VyužITíM Technologie FPGA; Optimization of Algorithms and Data …
2016
[70] Pheromone-Based Genetic Algorithm Adaptive Selection Algorithm in Cloud Storage
2016
[71] IMPACT OF CLOUD STORAGE SERVICES ON ORGANIZATIONS
International Conference on Research in Education and Science, 2016
[72] Optimization of algorithms and data structures for regular expression matching using FPGA technology
Dissertation, 2016
[73] Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems
Future Generation Computer Systems, 2016
[74] Research on Cloud Security Risk Assessment based on Fuzzy Entropy Weight Model
2016
[75] Research on the Method of Cloud Computing Storage Security based on the Homomorphic Encryption Method
2016
[76] Extension of Kerberos with X. 509 and Integration of Elliptic Curve Cryptography in Authentication
2016
[77] Performance analysis of anomaly detection of different IoT datasets using cloud micro services
2016
[78] Towards Data Driven Process Control in Manufacturing Car Body Parts
2016
[79] Security and Optimization Challenges of Green Data Centers
International Journal of Communications, Network and System Sciences, 2015
[80] Fault Tolerance Mechanisms in Distributed Systems
International Journal of Communications, Network and System Sciences, 2015
[81] Comparative Analysis of Wireless Security Protocols: WEP vs WPA
International Journal of Communications, Network and System Sciences, 2015
[82] Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
2015
[83] Dissemination of Information Communication Technologies: Mobile Government Practices in Developing States
International Journal of Communications, Network and System Sciences, 2015
[84] Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
International Journal of Communications, Network and System Sciences, 2015
[85] Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite
International Journal of Communications, Network and System Sciences, 2015
[86] Tinjauan Literatur: Review Perkembangan Keamanan dari Teknologi Cloud Computing
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top