|
[1]Abdat, N., Spruit, M., Bos, M. Cloud Computing and the Pricing Strategy for Vendors. In Murugesan, S. (ed.), Cloud Computing. [online] Available: http://m.spru.it/files/asb2009cc.pdf?attredirects=0&d=1, 2009. [2]Afterglow, [online] Available: http://afterglow.sourceforge.net/ , May, 2013. [3]Bloomberg Businessweek, “The New E-spionage Threat, BusinessWeek, [online] Available: http://www.businessweek.com/magazine/content/08_16/b4080032218430.htm, April 2008. [4]Chaisiri, S.,Bu-Sung Lee,Niyato, D., Optimization of Resource Provisioning Cost in Cloud Computing, Services Computing, IEEE Transactions on, vol.5, no.2,; pp. 164-177 , April-June 2012. [5]Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M., Vigna, G.: Organizing Large Scale Hacking Competitions. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 132–152. Springer, Heidelberg, 2010 [6]Ching-Huang Lin , Chung-Chih Chiang, Chien-Hung Chen, Yu-Chin Cheng, Chi-Sung Laih, 2007, “Design and implementation in causal relationship of attack events, Journal of Internet Technology, Vol. 8, No. 2, pp. 165-169, April 2007. [7]Ching-Huang Lin, Chien-Tung Lu, Ying-Hsien Chen, and Jung-Shian Li , Resource Allocation on Cloud Virtual Machines Based on Empirical Service Data Traces, International Journal of Communication Systems , June, 2013. [8]Chi-Sung Laih, Jung-Shian Li, Mao-Jie Lin, ShRiau-Han Chang, Li-Da Chen, Shih-Hsien Tseng, and Michael Chang , “Development and Operation of Testbed@TWISC, The 3rd Joint Workshop on Information Security(JWIS), July 10-11, Hanyang University, Seoul, Korea, 2008. [9]Chris Simmons, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Qishi Wu, AVOIDIT: A Cyber Attack Taxonomy, [online] Available: http://issrl.cs.memphis.edu/files/papers/CyberAttackTaxonomy_IEEE_Mag.pdf August, 2005. [10]Cyber Security Challenge: Cyber Security Challenge Website, [online] Available: https://cybersecuritychallenge.org.uk/, June, 2013. [11]Defcon challenge, https://www.hacking-lab.com/events/scs3-defcon-challenge.html [12]Elghoneimy, E., Bouhali, O., Alnuweiri, H, Resource allocation and scheduling in cloud computing, International Conference on Computing, Networking and Communications (ICNC), Maui, Hawaii, USA, 2 p.p. 309-314, DOI:10.1109/ICCNC.2012.6167434. 30 January 2012. [13]Emulab - Network Emulation Testbed , [online] Available: http://www.emulab.net/ , June, 2013. [14]F.Cuppens. “Managing alerts in a multi-intrusion detection environment. 17th Annual Computer Security Applications Conference (ACSAC). New-Orleans, December 2001. [15]Frank E. Gillett, Future View: The New Tech Ecosystems of Cloud, Cloud Services, And Cloud Computing, Forrester Research, Inc. Reproduction Prohibited. 28 August 2008. [16]Graphviz, [online] Available: http://www.graphviz.org/, June, 2013. [17]Guohui Wang, Ng, T.S.E., The Impact of Virtualization on Network Performance of Amazon EC2 Data Center, INFOCOM, 2010 Proceedings IEEE, San Diego, CA, USA, 14-19 March 2010. [18]Harold C. Lim, Shivnath Babu, Jeffrey S. Chase, Sujay S. Parekh, Automated control in cloud computing: challenges and opportunities, ACM 1st workshop on Automated Control for Datacenters and Clouds(ACDC), Barcelona, Spain, 2009 [19]Jelena Mirkovic, Terry V. Benzel, Stephen Schwab, The DETER Project: Advancing the Science of Cyber Security Experimentation and Test, Technologies for Homeland Security (HST), IEEE International Conference on, 2010. [20]Jonathan Kupferman, Jeff Silverman, Patricio Jara, and Jeff Browne, Scaling Into The Cloud, [Online] Available: http://www.techrepublic.com/whitepapers/scaling-into-the-cloud/3302611 , 2009. [21]JiyiWu, Lingdi Ping, Xiaoping Ge, YaWang, Jianqing Fu , Cloud Storage as the Infrastructure of Cloud Computing, International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Kuala Lumpur, Malaysia, pp.380-383 ,22-23 June 2010. [22]Josef Kaderka, Ontology in Cyber Defense and Computer Networks, CYBERNETIC LETTERS, SPECIAL ISSUE, December 2010. [23]Luis M. Vaquero, Luis Rodero-Merino, Rajkumar Buyya, Dynamically scaling applications in the cloud, SIGCOMM Comput. Commun. Rev.;41:45-52, 2011. [24]M. Armbrust, A.Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, A view of cloud computing, Communications of the ACM, Volume 53 Issue 4, April 2010. [25]M. Roesch, “Snort—Lightweight Intrusion Detection for Networks, Proc. USENIX LISA ’99 Conf., November.1999. [26]National Collegiate Cyber Defense Competition: Welcome to the National Collegiate Cyber Defense Competition, [Online] Available: http://www.nationalccdc.org/ , June, 2013. [27]NIST,NIST Definition of Cloud Computing v15, [Online] Available: http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc, , June, 2013. [28]Polytechnic Institute of NYU: CSAW - Cyber Security Competition, [Online] Available: http://www.poly.edu/csaw2011, June, 2013. [29]Raffael Marty, Applied Security Visualization, Addison Wesley Professional ,ISBN-13: 978-0-321-51010-5, 2008 [30]Ren, Y., Zhao, Y., Liu, P., Dou, K. and Li, J. , A survey on TCP Incast in data center networks. Int. J. Commun. Syst., doi: 10.1002/dac.2402, 2012. [31]RightScale Inc., Web-based Cloud Computing Management Platform by RightScale. [Online] Available: http://www.rightscale.com/, June, 2013. [32]Seyed Mohamad Alavi and Chi Zhou, Resource allocation scheme for orthogonal frequency division multiple access networks based on cooperative game theory, International Journal of Communication Systems, DOI: 10.1002/dac.2398, 2012. [33]Steve Gold, “Advanced Evasion Techniques, Network Security, Volume 2011, Issue 1, pp. 16-19, January 2011. [34]Sungkap Yeo, Lee H.-H.S., Using Mathematical Modeling in Provisioning a Heterogeneous Cloud Computing Environment, IEEE Computer, pp.44(8):55-62. , August 2011. [35]Urgaonkar, R. Kozat, U.C., Igarashi, K. and Neely, M.J., Dynamic resource allocation and power management in virtualized data centers, IEEE Network Operations and Management Symposium (NOMS), Osaka, Japan, pp. 479-486 19-23 April 2010. [36]Victor-Valeriu Patriciu, Adrian Constantin Furtuna, Guide for Designing Cyber Security Exercises, RECENT ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY, 2003 [37]Vigna, G.: The UCSB iCTF, [Online] Available: http://ictf.cs.ucsb.edu/ , June, 2013. [38]VMware, Inc., vSphere resource management guide Release 5.1, [Online]. Available: http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-50-resourcemanagement-guide.pdf, 2012. [39]Wei Jiang, Bin-xing Fang, Hong-li Zhang, Zhi-hong Tian, Optimal Network Security Strengthening Using Attack-Defense Game Model. Sixth International Conference on Information Technology: New Generations, 2009. [40]Yadav, S.S., Zeng Wen Hua, CLOUD: A computing infrastructure on demand, 2nd International Conference on Computer Engineering and Technology (ICCET), Chengdu, China; pp. 423-426 , 16-18 April 2010. [41]Zhang Heng-Ru, Gong Jie, “Research and Design of Network Attack and Defense Platform based on Virtual Honeynet, Computational and Information Sciences (ICCIS), 2010 International Conference on, pp. 507-510, December 2010. [42]Zhang Ting, Guo Lin-Hong, “Research and Implementation of Experimental Platform for Network Attack and Defence Based on Honeynet, Advanced Materials Research, Volume 403-408, pp. 2221-2224, November 2011. [43]Zhou, LiFeng; Chen, Lei; Pung, Hung Keng; Ngoh, Lek Heng, Identifying QoS violations through statistical endto-end analysis, International Journal of Communication Systems, 24:(10)1388-1406, DOI: 10.1002/dac.1273. October 2011. [44]江政哲、張迺貞, 初探雲端運算,2010海峽兩岸圖書資訊學術研討會,南京, 2010. [45]林敬皇、盧建同、李忠憲、楊竹星, 網路攻擊與防禦平台之研究與實作, 第二十二屆資訊安全會議(CISC2012), 台中, May, 2012.
|