The Tao of Network Security Monitoring: Beyond Intrusion Detection. Pearson Education Available: https, 2004. ,
Snort: Lightweight intrusion detection for networks, Proc. LISA '99, pp.229-238, 1999. ,
Making Cloud SLAs readily usable in the EU private sector Available: https, 2016. ,
Discus: A massively distributed IDS architecture using a DSL-based configuration, 2014 International Conference on Information Science, Electronics and Electrical Engineering, 2014. ,
DOI : 10.1109/InfoSEEE.2014.6947859
URL : https://hal.archives-ouvertes.fr/hal-00996876
SLA★: An abstract syntax for Service Level Agreements, 2010 11th IEEE/ACM International Conference on Grid Computing, 2010. ,
DOI : 10.1109/GRID.2010.5697973
Automatically Enforcing Security SLAs in the Cloud, IEEE Transactions on Services Computing, 2016. ,
DOI : 10.1109/TSC.2016.2540630
Including Security Monitoring in Cloud Service Level Agreements Available: https, Symposium on Reliable Distributed Systems (SRDS), PhD forum, 2016. ,
Signal detection theory, 1966. ,
The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, 1999. ,
DOI : 10.1145/319709.319710
Base-rate errors and rain forecasts, Nature, vol.382, issue.6594, p.766, 1996. ,
DOI : 10.1038/382766a0
Measuring intrusion detection capability, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, 2006. ,
DOI : 10.1145/1128817.1128834
Automatic Evaluation of Intrusion Detection Systems, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006. ,
DOI : 10.1109/ACSAC.2006.15
Web services agreement specification (ws-agreement), Open Grid Forum, p.216, 2007. ,
REST-Based SLA Management for Cloud Applications, 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.93-98, 2015. ,
DOI : 10.1109/WETICE.2015.36
An exploratory study of cloud service level agreements-state of the art review, KSII TIIS, vol.9, issue.3, 2015. ,
Adding Virtualization Capabilities to the Grid???5000 Testbed, Cloud Computing and Services Science, ser. Communications in Computer and Information Science, pp.3-20, 2013. ,
DOI : 10.1007/978-3-319-04519-1_1
URL : https://hal.archives-ouvertes.fr/hal-00946971
An exploration of L2 cache covert channels in virtualized environments, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.29-40, 2011. ,
DOI : 10.1145/2046660.2046670
Insertion, evasion, and denial of service: Eluding network intrusion detection, DTIC Document, 1998. ,
Tcp syn flooding and ip spoofing attacks CERT Advisory CA-1996-21, pp.1996-2021, 1996. ,