User-Level Runtime Security Auditing for the Cloud.
Suryadipta MajumdarTaous MadiYushun WangYosr JarrayaMakan PourzandiLingyu WangMourad DebbabiPublished in: IEEE Trans. Inf. Forensics Secur. (2018)
Keyphrases
- access control
- statistical databases
- user interface
- application level
- end users
- security level
- user authentication
- user defined
- malicious code detection
- network security
- intrusion detection
- relevance feedback
- user friendliness
- cloud computing
- security threats
- virtual machine
- security issues
- inference control
- intrusion detection system
- user centric
- database
- recommender systems
- website
- social networks
- search engine