Attack Types and Intrusion Detection Systems in Cloud Computing U Oktay, OK Sahingoz Information Security and Cryptology (ISC), 2013 6th International Conference …, 2013 | 52 | 2013 |
Proxy network intrusion detection system for cloud computing U Oktay, OK Sahingoz 2013 the international conference on technological advances in electrical …, 2013 | 45 | 2013 |
Circular chain VM protection in AdjointVM U Oktay, MA Aydin, OK Sahingoz 2013 The International Conference on Technological Advances in Electrical …, 2013 | 9 | 2013 |
A circular chain intrusion detection for cloud computing based on improved AdjointVM approach U Oktay, MA Aydin, OK Sahingoz 2013 IEEE 14th International Symposium on Computational Intelligence and …, 2013 | 8 | 2013 |
OS (2013) U Oktay Attack Types and Intrusion Detection Systems in Cloud Computing. 6th …, 0 | 6 | |