[1. Kevin, S. Security in a Virtualized World. – Journal of Network Security, Vol. 8, 2009, pp. 15-18.10.1016/S1353-4858(09)70077-7]Search in Google Scholar
[2. Praveen Kumar, P., K. Bhaskar Naik. A Survey on Cloud Based Intrusion Detection System. – International Journal of Software and Web Sciences, Vol. 4, 2013, No 2, pp. 98-102.]Search in Google Scholar
[3. Sanjay Ram, M., N. Velmurugan, S. Thirukumaran. Effective Analysis of Cloud Based Intrusion Detection System. – International Journal of Computer Applications & Information Technology, Vol. 1, 2012, No 2, pp.16-22.]Search in Google Scholar
[4. Jin, H., G. Xiang, D. Zou, S. Wu, F. Zhoa, M. Li et al. A VMM-Based Intrusion Prevention System in Cloud Computing Environment. – Journal of Supercomputing, Springer Science Business Media, LLC, Vol. 66, 2013, No 3, pp. 1133-1151.10.1007/s11227-011-0608-2]Search in Google Scholar
[5. Vieira, K., A. Schulter, C. Westphall, C. Westphall. Intrusion Detection Techniques in Grid and Cloud Computing Environment. – Proc. IEEE IT Professional Magazine, Vol. 12, 2010, No 4, pp. 38-43.10.1109/MITP.2009.89]Search in Google Scholar
[6. Amjad, H.B., P. Sabyasachi, J. Debasish. Machine Learning Approach for Intrusion Detection on Cloud Virtual Machines. – International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, 2013, No 6, pp. 57-66.]Search in Google Scholar
[7. Garfinkel, T., M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. – In. Proc. of Network and Distributed Systems Security Symposium, 2003, pp. 191-206.]Search in Google Scholar
[8. Amirreza, Z., Z. Alireza. Internet Intrusion Detection System Service in a Cloud. – International Journal of Computer Science Issues, Vol. 9, 2012, No 5, pp. 308-315.]Search in Google Scholar
[9. Kourai, K., S. Chiba. HyperSpector: Virtual Distributed Monitoring Environments for Secure Intrusion Detection. – In: Proc. of International Conference on Virtual Execution Environments, ACM, Chicago, 2005, pp. 197-207.]Search in Google Scholar
[10. Jones, A. K., R. S. Sielken. Computer System Intrusion Detection: A Survey. – Techreport, September 2000, pp. 1-25. doi=10.1.1.24.7802.]Search in Google Scholar
[11. Parag, K. S., S. Sneha, A. D. Gawande. Intrusion Detection System for Cloud Computing. – International Journal of Scientific & Technology Research, Vol. 1, 2012, No 4, pp. 67-71.]Search in Google Scholar
[12. Dunlap, G. W., S. T. King, S. Cinar, M. Basrai, P. M. Chen. Revirt: Enabling Intrusion Analysis through Virtual Machine Logging and Replay. – In: Proc. of 5th Symposium on Operating Systems Design and Implementation, USENIX, Boston, 2002, pp. 211-224.]Search in Google Scholar
[13. Feng, Z., H. Jin. Automated Approach to Intrusion Detection in VM-Based Dynamic Execution Environment. – Computing and Informatics, Vol. 31, 2012, pp. 271-297.]Search in Google Scholar
[14. Vikrant, G. D., G. B. Atul, A. A. Nikhil. Intrusion Detection System for Cloud Computing. – International Journal of Engineering Research & Technology (IJERT), Vol. 2, 2013, No 4, pp. 2149-2153.]Search in Google Scholar
[15. Zeenat, M., A. Chetan, S. H. Syed et al. Intrusion Detection in Cloud Computing Environment Using Neural Network. – International Journal of Research in Computer Engineering and Electronics, Vol. 1, 2012, No 1, pp. 1-4.]Search in Google Scholar
[16. Ubhale, P. R., A. M. Sahu. Securing Cloud Computing Environment by Means of Intrusion Detection and Prevention System (IDPS). – International Journal of Computer Science and Management Research, Vol. 2, 2013, No 5, pp. 2430-2435.]Search in Google Scholar
[17. Otte, C., C. Tormann. Improving the Accuracy of Network Intrusion Detectors by Input-Dependent Stacking. – Integrated Computer-Aided Engineering, Vol. 18, 2011, No 3, pp. 291-297.10.3233/ICA-2011-0370]Search in Google Scholar
[18. Nirmala, A. P., R. Sridaran. Cloud Computing Issues at Design and Implementation Levels – A Survey. – International Journal of Advanced Networking and Applications, Vol. 3, 2012, No 6, pp. 1444-1449.]Search in Google Scholar
[19. Farzad, S. Secure Virtualization for Cloud Environment Using Hypervisor-Based Technology. – International Journal of Machine Learning and Computing, Vol. 2, 2012, No 1, pp. 39-45.10.7763/IJMLC.2012.V2.87]Search in Google Scholar
[20. Vinothina, V., R. Sridaran, G. Padmavathi. A Survey on Resource Allocation Strategies in Cloud Computing. – International Journal of Advanced Computer Science and Applications, Vol. 3, 2012, No 6, pp. 97-104.10.14569/IJACSA.2012.030616]Search in Google Scholar
[21. Jang, J. S. R. ANFIS: Adaptive-Network-Based Fuzzy Inference Systems. – IEEE Transactions on Systems, Man, and Cybernetics, Vol. 23, 1993, No 3, pp. 665-685.10.1109/21.256541]Search in Google Scholar
[22. Guler, I., E. D. Ubeyli. Application of Adaptive Neuro-Fuzzy Inference System for Detection of Electrocardiographic Changes in Patients with Partial Epilepsy Using Feature Extraction. – Expert Systems with Applications, Vol. 27, 2004, pp. 323-330.10.1016/j.eswa.2004.05.001]Search in Google Scholar
[23. Guler, I., E. D. Ubeyli. Adaptive Neuro-Fuzzy Inference System for Classification of EEG Signals Using Wavelet Coefficients. – Journal of Neuroscience Methods, 2005, pp. 1-9.]Search in Google Scholar
[24. Fallahpour, A. R., A. R. Moghassem. Yarn Strength Modeling Using Adaptive Neuro-Fuzzy Inference System (ANFIS) And Gene Expression Programming (GEP). – Journal of Engineered Fibers and Fabrics, Vol. 8, 2013, No 4, pp. 6-18.10.1177/155892501300800409]Search in Google Scholar
[25. Tavallaee, M., E. Bagheri, L. Wei, A. Ghorbani. Detailed Analysis of the KDD CUP 99 Data Set. – In: Proc. of IEEE Symposium on Computational Intelligence in Security and Defense Applications, Ottawa, 2009, pp. 1-6.10.1109/CISDA.2009.5356528]Search in Google Scholar
[26. Loganathan, C., K. V. Girija. Hybrid Learning for Adaptive Neuro Fuzzy Inference System. – International Journal of Engineering and Science, Vol. 2, 2013, No 11, pp. 6-13.]Search in Google Scholar
[27. Gang, W., H. Jinxing, M. Jian, H. Lihua. A New Approach to Intrusion Detection Using Artificial Neural Networks and Fuzzy Clustering. – Expert Systems with Applications, Vol. 37, 2010, No 9, pp. 6225-6232.10.1016/j.eswa.2010.02.102]Search in Google Scholar