Login / Signup
User-Level Runtime Security Auditing for the Cloud.
Suryadipta Majumdar
Taous Madi
Yushun Wang
Yosr Jarraya
Makan Pourzandi
Lingyu Wang
Mourad Debbabi
Published in:
IEEE Trans. Inf. Forensics Secur. (2018)
Keyphrases
</>
access control
statistical databases
user interface
application level
end users
security level
user authentication
user defined
malicious code detection
network security
intrusion detection
relevance feedback
user friendliness
cloud computing
security threats
virtual machine
security issues
inference control
intrusion detection system
user centric
database
recommender systems
website
social networks
search engine