|
|
|
References
|
|
|
1. |
GDV Data Protection Blog http://www.globaldatavault.com/blog/for-magnolia-not-so-well-done/ |
2. |
Materialy WindowSecurity.com http://www.windowsecurity.com/search.asp?s=cloud |
3. |
Zegzhda D. P., Ivashko A. M., Kak postroit zaschischennuyu informatsionnuyu sistemu, Mir i semya, SPb, 1997, 312 pp. |
4. |
Press Release. Major Standards Development Organizations Collaborate to Further Adoption of Cloud Standards http://cloud-standards.org/wiki/index.php?title=Press_Release |
5. |
Cloud Standards Summit. OMG Standards in Government & NGO's Workshop http://www.omg.org/news/meetings/GOV-WS/css/index.htm |
6. |
Cloud Security Alliance https://cloudsecurityalliance.org/ |
7. |
Organization for the Advancement of Structured Information Standards http://www.oasis-open.org/org/ |
8. |
Open Data Center Alliance http://www.opendatacenteralliance.org/ |
9. |
National Institute of Standards and Technology http://www.nist.go/ |
10. |
CNews Cloud. Opublikovany dva dokumenta, napravlennykh na standartizatsiyu oblachnoi bezopasnosti, http://cloud.cnews.ru/news/line/index.shtml?2011/06/09/443475 |
11. |
Cloud-in-a-Box http://newsroom.intel.com/docs/DOC-2194 |
12. |
Cloud Security Platform http://itnews.com.ua/60064.html |
13. |
Virtual desktop malware defence, http://www.dennistechnologylabs.com/reports/security/anti-malware/symantec/DTL_SYM_VDI.pdf |
14. |
Symantec Endpoint Protection 12.1, http://www.symantec.com/content/ru/ru/enterprise/fact_sheets/ru-Symantec_Endpoint_Protection_SEP_Datasheet.pdf |
15. |
Cisco vypustila resheniya dlya obespecheniya bezopasnosti cloud-servisov, http://www.securitylab.ru/news/378170.php |
16. |
IBM Security NetworkIntrusion Prevention System http://public.dhe.ibm.com/common/ssi/ecm/en/wgd03002usen/WGD03002USEN.PDF |
17. |
Oblachnye servisy na platforme HP CloudSystem, http://storagenews.ru/46/HP_CloudService_46.pdf |
18. |
Russkaya gruppa polzovatelei Snort http://www.snortgroup.ru/ |
19. |
Fifth ACM SIGKDD International Conference on Knowledge Discovery & Data Mining http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html |
20. |
Fralenko V. P., “Neirosetevoe shifrovanie s primeneniem arkhitektury «koder/dekoder»”, Neirokompyutery: razrabotka i primenenie, 2010, no. 5, 11–16 |
21. |
Fralenko V. P., “Neirosetevaya tekhnologiya obnaruzheniya setevykh atak na informatsionnye resursy”, Aktualnye problemy raketno-kosmicheskogo priborostroeniya i informatsionnykh tekhnologii, III Vserossiiskaya nauchno-tekhnicheskaya konferentsiya, Izd-vo Radiotekhnika, M., 2011, 479–488 |
22. |
Modul monitoringa anomalnoi setevoi aktivnosti na osnove iskusstvennykh neironnykh setei — «Egida-NS», Svidetelstvo o gosudarstvennoi registratsii programmy dlya EVM № 2011611277 |
23. |
Emelyanova Yu. G., Talalaev A. A., Tischenko I. P., Fralenko V. P., “Neirosetevaya tekhnologiya obnaruzheniya setevykh atak na informatsionnye resursy”, Programmnye sistemy: teoriya i prilozheniya, 2:3(7) (2011), 3–15 http://psta.psiras.ru/read/psta2011_3_3-15.pdf |
24. |
Talalaev A. A., Tischenko I. P., Khachumov V. M., Fralenko V. P., “Razrabotka neirosetevogo modulya monitoringa anomalnoi setevoi aktivnosti”, Neirokompyutery: razrabotka i primenenie, 2011, no. 7, 32–38 |