Cloud security auditing based on behavioural modelling. Dolgikh, A. M., Birnbaum, Z., Liu, B., Chen, Y., & Skormin, V. A. IJBPIM, 7(2):137-152, 2014. Link Paper bibtex @article{journals/ijbpim/DolgikhBLCS14,
added-at = {2016-01-05T00:00:00.000+0100},
author = {Dolgikh, Andrey M. and Birnbaum, Zachary and Liu, Bingwei and Chen, Yu and Skormin, Victor A.},
biburl = {http://www.bibsonomy.org/bibtex/2350afe6df808e4f7d876dadacb378542/dblp},
ee = {http://dx.doi.org/10.1504/IJBPIM.2014.063518},
interhash = {4f82e8c1e50cf3161f0fcd5725166830},
intrahash = {350afe6df808e4f7d876dadacb378542},
journal = {IJBPIM},
keywords = {dblp},
number = 2,
pages = {137-152},
timestamp = {2016-01-06T11:40:50.000+0100},
title = {Cloud security auditing based on behavioural modelling.},
url = {http://dblp.uni-trier.de/db/journals/ijbpim/ijbpim7.html#DolgikhBLCS14},
volume = 7,
year = 2014
}
Downloads: 0
{"_id":"MdjJndbhXGzqP6pxj","bibbaseid":"dolgikh-birnbaum-liu-chen-skormin-cloudsecurityauditingbasedonbehaviouralmodelling-2014","downloads":0,"creationDate":"2016-01-08T22:33:13.084Z","title":"Cloud security auditing based on behavioural modelling.","author_short":["Dolgikh, A. M.","Birnbaum, Z.","Liu, B.","Chen, Y.","Skormin, V. A."],"year":2014,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/john m peloquin?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2016-01-05T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Dolgikh"],"firstnames":["Andrey","M."],"suffixes":[]},{"propositions":[],"lastnames":["Birnbaum"],"firstnames":["Zachary"],"suffixes":[]},{"propositions":[],"lastnames":["Liu"],"firstnames":["Bingwei"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Yu"],"suffixes":[]},{"propositions":[],"lastnames":["Skormin"],"firstnames":["Victor","A."],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/2350afe6df808e4f7d876dadacb378542/dblp","ee":"http://dx.doi.org/10.1504/IJBPIM.2014.063518","interhash":"4f82e8c1e50cf3161f0fcd5725166830","intrahash":"350afe6df808e4f7d876dadacb378542","journal":"IJBPIM","keywords":"dblp","number":"2","pages":"137-152","timestamp":"2016-01-06T11:40:50.000+0100","title":"Cloud security auditing based on behavioural modelling.","url":"http://dblp.uni-trier.de/db/journals/ijbpim/ijbpim7.html#DolgikhBLCS14","volume":"7","year":"2014","bibtex":"@article{journals/ijbpim/DolgikhBLCS14,\n added-at = {2016-01-05T00:00:00.000+0100},\n author = {Dolgikh, Andrey M. and Birnbaum, Zachary and Liu, Bingwei and Chen, Yu and Skormin, Victor A.},\n biburl = {http://www.bibsonomy.org/bibtex/2350afe6df808e4f7d876dadacb378542/dblp},\n ee = {http://dx.doi.org/10.1504/IJBPIM.2014.063518},\n interhash = {4f82e8c1e50cf3161f0fcd5725166830},\n intrahash = {350afe6df808e4f7d876dadacb378542},\n journal = {IJBPIM},\n keywords = {dblp},\n number = 2,\n pages = {137-152},\n timestamp = {2016-01-06T11:40:50.000+0100},\n title = {Cloud security auditing based on behavioural modelling.},\n url = {http://dblp.uni-trier.de/db/journals/ijbpim/ijbpim7.html#DolgikhBLCS14},\n volume = 7,\n year = 2014\n}\n\n","author_short":["Dolgikh, A. M.","Birnbaum, Z.","Liu, B.","Chen, Y.","Skormin, V. A."],"key":"journals/ijbpim/DolgikhBLCS14","id":"journals/ijbpim/DolgikhBLCS14","bibbaseid":"dolgikh-birnbaum-liu-chen-skormin-cloudsecurityauditingbasedonbehaviouralmodelling-2014","role":"author","urls":{"Link":"http://dx.doi.org/10.1504/IJBPIM.2014.063518","Paper":"http://dblp.uni-trier.de/db/journals/ijbpim/ijbpim7.html#DolgikhBLCS14"},"keyword":["dblp"],"downloads":0},"search_terms":["cloud","security","auditing","based","behavioural","modelling","dolgikh","birnbaum","liu","chen","skormin"],"keywords":["dblp"],"authorIDs":[],"dataSources":["7iBjTDWSdK27C35dP"]}