[1] M.Ramachandran,V.Chang,Int. J.Inf, 2016.Towards performance evaluation of cloud service providers for cloud data security,”, 36 618 -625
[2] Y. A.Mohamed,A. B.Abdullah, 2010.Implementation of IDS with response for securing MANETs,”,in Proceedings 2010 International Symposium on Information Technology - Engineering Technology, ITSim'10 -
[3] K.Venkataramana,M.Padmavathamma, .“Multi-agent Intrusion Detection and Prevention System for Cloud Environment,”,Int. J. Comput. Appl. 49 -
[4] 2012., 29 -
[5] Z.Chang,Y. L.Zhu, 2011.The design of wireless intrusion detection system based on immune algorithm,”,in International Conference on Machine Learning and Cybernetics -
[6] P.Singh,Hada,R.Singh,and M.Manmohan Meghwal,Int, 2011.,J. Comput. Appl. 36 975 -8887
[7] C.Saadi,H.Chaoui,Clust, 2016.Cloud Computing Security Using IDS-AM-, 85 433 -442
[8] A. V.Dastjerdi,K. A.Bakar,S. G. H.Tabatabaei, 2009.Distributed Intrusion Detection in Clouds Using Mobile Agents, -
[9] H.Toumi,A.Talea,B.Marzak,A.Eddaoui,M.Talea,Int. J. Commun. NetworksInf, 2015.Cooperative trust framework for cloud computing based on mobile agents,”, -
[10] H.Wang,H.Zhou,C.Wang,J.Comput, 2012.Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment,”, 7 -
[11] H.Idrissi,M.Ennahbaoui,E. M.Souidi,S.El,Hajji, 2015.Mobile Agents with Cryptographic Traces for Intrusion Detection in the Cloud Computing, 73 179 -186
[12] N. AfzaliSeresht,R.Azmi, 2014.MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach, 35 286 -298
[13] Technol. Lab., 2011., 145 7 -
[14] Artif. Intell., 2017., -
[15] Netw, 2016.,Comput. Appl. 75 200 -222
[16] S.Subashini,V.Kavitha, 2011.A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications 34 1 -11
[17] A.Patcha,J. M.Park, 2007.An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Comput. Networks 51 3448 -3470
[18] A.Patel,M.Taghavi,K.Bakhtiyari,J. CelestinoJúnior, .An intrusion detection and prevention system in cloud computing: A systematic review,” Journal of Network and Computer Applications 36 -
[19] C.Modi,D.Patel,B.Borisaniya,H.Patel,A.Patel,M.Rajarajan,J.Netw, 2013.A survey of intrusion detection techniques in Cloud,”,Comput. Appl. 36 42 -57
[20] Netw, 2012.,Comput. Appl. 36 16 -24
[21] Sci., 2016., 6 -
[22] Silva , E.,Costa , and R.,Santos, 2012.A survey of security in multi-agent systems,” Expert Systems with Applications 39 4835 -4846
[23] Z. A.Baig, .“Multi-agent systems for protecting critical infrastructures: A survey,” Journal of Network and Computer Applications 35 1151 -1161
[24] H. Toumi, A. Talea, B. Marzak, A. Eddaoui, and M. Talea, “Cooperative trust framework for cloud computing based on mobile agents,” Int. J. Commun. Networks Inf. Secur., 2015.
[25] F. Bellifemine, G. Caire, A. Poggi, and G. Rimassa, “JADE: A software framework for developing multi-agent applications. Lessons learned,” Inf. Softw. Technol., vol. 50, no. 1-2, pp. 10-21, 2008
[26] P. Shinde and T. J. Parvat, “DDoS Attack Analyzer: Using JPCAP and WinCap,” in Procedia Computer Science, 2016, vol. 79, pp. 781-784.
[27] C. J. Su, “Mobile multi-agent based, distributed information platform (MADIP) for wide-area e-health monitoring,” Comput. Ind., vol. 59, no. 1, pp. 55-68, 2008
[28] G. Fortino, A. Garro, and W. Russo, “Achieving Mobile Agent Systems interoperability through software layering,” Inf. Softw. Technol., vol. 50, no. 4, pp. 322-341, 2008.
[29] G. P. Spathoulas and S. K. Katsikas, “Reducing false positives in intrusion detection systems,” Comput. Secur., vol. 29, no. 1, pp. 35-44, 2010.
[30] L. Cazorla, C. Alcaraz, and J. Lopez, “A three-stage analysis of IDS for critical infrastructures,” Comput. Secur., vol. 55, pp. 235-250, 2015