| 期刊論文1. | 敦陽科技(2006)。多功能資安管理系統--UTM。敦陽資安電子報,2006(Oct.)。 延伸查詢 | 2. | Berger, S.、Ca'ceres, R.、Goldman, K.、Pendarakis, D.、Perez, R.、Rao, J. R.、Rom, E.、Sailer, R.、Schildhauer, W.、Srinivasan, D.、Tal, S.、Valdez, E.(2008)。Security for the cloud infrastructure: Trusted virtual data center implementation。IBM Journal of Research and Development,53,1-12。 | 3. | Grobauer, B.、Walloschek, T.、Stocker, E.(2010)。Understanding cloud-computing vulnerabilities。IEEE Security and Privacy,9,1-14。 | 4. | Subashini, S.、Kavitha, V.(2011)。A Survey on Security Issues in Service Delivery Models of Cloud Computing。Journal of Network and Computer Applications,34,1-11。 | 會議論文1. | Aman, B.、Yogesh, B.(2010)。Securing cloud from DDoS attacks using intrusion detection system in virtual machine。International Conference on Communication Software and Networks,260-264。 | 2. | Dastjerdi, A. V.、Bakar, K. A.、Tabatabaei, S. G. H.(2009)。Distributed intrusion detection in clouds using mobile agents。International Conference on Advanced Engineering Computing and Applications in Sciences,175-180。 | 3. | Huang, W.、Yang, J.(2010)。New network security based on cloud computing。International Workshop on Education Technology and Computer Science,604-609。 | 4. | Jensen, M.、Schwenk, J.、Gruschka, N.、Iacono, L. L.(2009)。On technical security issues in cloud computing。IEEE International Conference on Cloud Computing,109-116。 | 5. | Jia, T.、Wang, X.(2009)。The construction and realization of the intelligent NIPS based on the cloud security。International Conference on Information Science and Engineering,1885-1888。 | 6. | Roschke, S.、Cheng, F.、Meinel, C.(2009)。Intrusion detection in the cloud。IEEE International Conference on Dependable, Autonomic and Secure Computing,729-734。 | 其他1. | 陳培德(2001)。入侵偵測系統簡介。 延伸查詢 | 2. | Cloud Computing Use Case Discussion Group(2010)。Cloud computing use cases white paper version 4.0,http://www.cloud-council.org/Cloud_Computing_Use_Cases_Whitepaper-4_0.pdf。 | 3. | Cloud Security Alliance(2009)。Security guidance for critical area of focus in cloud computing v2.1,https://cloudsecurityalliance.org/csaguide.pdf。 | 4. | Cloud Security Alliance(2010)。Top threats to cloud computing,https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf。 | 5. | Trend Micro(2009)。The future of threats and threat technologies,https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_trend_micro_2010_future_threat_report_final.pdf。 | |