Muutke küpsiste eelistusi

E-raamat: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations

Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 159,93 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.

Arvustused

From the book reviews:

This book on bio-inspiring cyber security and cloud services is part of Springers Intelligent Systems Reference Library series, which discusses advances in intelligent systems. The volume tries to highlight the advantages of bio-inspiring cyber security. This reference book will be an eye-opener to the applications of bio-inspired techniques for cyber security. I recommend it for students and researchers in that area. (S. V. Nagaraj, Computing Reviews, February, 2015)

Part I Bio-inspiring Systems in Cyber Security
1 A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events
3(36)
Ayman M. Bahaa-Eldin
1.1 Introduction
4(1)
1.1.1 IDS Correlation Problem Definition
4(1)
1.1.2 Article Organization
4(1)
1.2 Related Work
5(7)
1.2.1 Distributed and Bio Inspired Intrusion Detection
5(1)
1.2.2 Distributed Correlation
5(1)
1.2.3 Agents in IDS and Correlation
5(1)
1.2.4 Comprehensive Approach Model for IDS Alert Correlation
5(1)
1.2.5 Distributed Agent Correlation Model
6(1)
1.2.6 IDSs Correlation Agents
7(1)
1.2.7 INFOSEC Tools Agents
8(1)
1.2.8 System and Application Log Agents
8(1)
1.2.9 DACM Central Agent
9(1)
1.2.10 Response Agent
10(1)
1.2.11 Learning Agent
10(1)
1.2.12 The Knowledge Base and Security Policy
10(1)
1.2.13 DACM Components
11(1)
1.2.14 Implementation Scope and Performance Enhancement
12(1)
1.3 DACM Design and Algorithms
12(15)
1.3.1 IDS Alert Correlation
12(1)
1.3.2 Modified CAM Time
13(2)
1.3.3 DACM Individual Agents
15(12)
1.3.4 Implementation Environment
27(1)
1.4 DACM Results and Analysis
27(8)
1.4.1 CRIAS Data Set
27(1)
1.4.2 IDS Alerts Correlation Results
28(3)
1.4.3 DACM Components Results
31(1)
1.4.4 DACM Central Agent Results
32(1)
1.4.5 DACM Evaluation and Assessment
33(2)
1.5 Conclusions and Future Work
35(1)
References
36(3)
2 Bio-inspired Evolutionary Sensory System for Cyber-Physical System Security
39(32)
Mohamed Azab
Mohamed Eltoweissy
2.1 Introduction
40(2)
2.2 Attack Scenario
42(3)
2.3 CPS Attack Detection and Resolution Techniques
45(6)
2.3.1 Malware Detection
45(3)
2.3.2 Standalone and Distributed Monitoring and Evaluation Solutions
48(2)
2.3.3 CPS Related Control Solutions
50(1)
2.4 Evolutionary Sensory System (CyPhyMASC)
51(14)
2.4.1 Overview of the Cell-Oriented Architecture
51(1)
2.4.2 The Foundation
52(1)
2.4.3 CyPhyMASC Security Provisioning Methodology
53(3)
2.4.4 Evolutionary Sensing and Effecting Framework
56(2)
2.4.5 CyPhyMASC Brain Architecture
58(7)
2.5 Example of CyPhyMASC Security Mission
65(3)
2.5.1 Detection and Resolution Scenario
66(1)
2.5.2 CyPhyMASC Addressing the BW Attacker Assumptions
67(1)
2.6 Conclusion
68(1)
References
68(3)
3 An Optimized Approach for Medical Image Watermarking
71(22)
Mona M. Soliman
Aboul Ella Hassanien
Hoda M. Onsi
3.1 Introduction
72(2)
3.2 Preliminaries
74(6)
3.2.1 Swarm Intelligent Optimization
74(6)
3.3 The Proposed Medical Watermarking Approach
80(4)
3.3.1 Watermark Embedding Procedure
80(3)
3.3.2 Watermark Extraction Procedure
83(1)
3.4 Experimental Results and Analysis
84(5)
3.4.1 Evaluation Analysis
85(3)
3.4.2 Convergence Comparison
88(1)
3.5 Conclusion and Future Works
89(1)
References
90(3)
4 Bio-inspiring Techniques in Watermarking Medical Images: A Review
93(22)
Mona M. Soliman
Aboul Ella Hassanien
Hoda M. Onsi
4.1 Introduction
94(1)
4.2 Bio-inspiring Computing
95(4)
4.2.1 Artificial Neural Networks
95(1)
4.2.2 Evolutionary Algorithms
96(1)
4.2.3 Genetics Algorithms
97(1)
4.2.4 Swarm Intelligence
98(1)
4.3 Medical Image Watermarking: Classification and Generic Model
99(3)
4.3.1 Medical Watermarking Classification
100(1)
4.3.2 Generic Medical Image Watermarking System
101(1)
4.4 BI in Medical Image Watermarking
102(6)
4.4.1 Artificial Neural Networks in Medical Image Watermarking
102(1)
4.4.2 Genetic Algorithms in Medical Image Watermarking
103(1)
4.4.3 Swarms Intelligent in Medical Image Watermarking
104(3)
4.4.4 Hybrid Bio-inspiring Systems in Medical Watermarking
107(1)
4.5 Watermarking Assessment Measures
108(3)
4.5.1 Imperceptibility or Transparency
109(1)
4.5.2 Robustness
110(1)
4.6 Conclusions and Future Directions
111(1)
References
112(3)
5 Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking
115(36)
Sajjad Dadkhah
Azizah Abd Manaf
Somayeh Sadeghi
5.1 Introduction
116(2)
5.2 Related Work
118(2)
5.2.1 Digital Image Authentication Methods
118(2)
5.3 The Proposed Algorithm
120(13)
5.3.1 The Proposed Watermarking Scheme
121(9)
5.3.2 The Proposed Tamper Detection Scheme
130(3)
5.4 Experimental Results
133(13)
5.4.1 Watermark Quality Experiments Result
134(2)
5.4.2 Tamper Detection Experiments Results
136(1)
5.4.3 Deletion and Copy-Move Tampering Attacks
136(6)
5.4.4 Bit Tampering Experiments Results
142(4)
5.5 Conclusion
146(1)
References
146(5)
Part II Mobile Ad Hoc Networks and Key Managements
6 TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks
151(34)
Ayman M. Bahaa-Eldin
6.1 Introduction
151(2)
6.2 Background
153(10)
6.2.1 Mobile Ad-Hoc Networks
153(8)
6.2.2 Swarm Intelligence
161(2)
6.3 Trusted Routing Protocols for MANETs
163(6)
6.3.1 Examples of Trusted Routing Protocols
163(6)
6.4 Trusted Ant Colony Based Routing Algorithm for Mobile Ad-Hoc Networks
169(8)
6.4.1 Routing Table Data Structure
171(1)
6.4.2 Node Trust Evaluation
171(1)
6.4.3 Route Discovery
172(3)
6.4.4 Route Selection and Route Failure Handling
175(1)
6.4.5 Route Maintenance
175(1)
6.4.6 TARA Complexity Analysis
176(1)
6.5 Performance Evaluation of TARA
177(4)
6.5.1 Simulation Environment
177(1)
6.5.2 Simulation Results and Analysis
178(3)
6.6 Conclusion
181(1)
References
182(3)
7 An Overview of Self-Protection and Self-Healing in Wireless Sensor Networks
185(18)
Tarek Gaber
Aboul Ella Hassanien
7.1 Introduction
185(1)
7.2 Wireless Sensor Networks Architecture
186(1)
7.3 Autonomic Computing
187(3)
7.3.1 Autonomic Computing Characteristic
188(1)
7.3.2 Autonomic Computing Elements
189(1)
7.4 Self-Protection
190(3)
7.4.1 Self-Protection in WSN
191(2)
7.5 Self-Healing
193(2)
7.6 Self-Healing in WSNs
195(3)
7.6.1 Existing Solution of WSN with Self-Healing
195(3)
7.7 BiSNET: Biologically-Inspired Architecture for Sensor NETworks
198(2)
7.7.1 Overview of BiSNET
198(1)
7.7.2 Self-Healing in BiSNET
199(1)
7.8 Conclusions
200(1)
References
201(2)
8 Cybercrime Investigation Challenges: Middle East and North Africa
203(22)
Mohamed Sarrab
Nasser Alalwan
Ahmed Alzahrani
Mandi Kordestani
8.1 Introduction
204(1)
8.2 Related Work
205(1)
8.3 Conceptualizing Cybercrime
205(1)
8.4 State of Information Security in North Africa and Middle East
206(2)
8.4.1 Information Technology Infrastructure
207(1)
8.4.2 Growth of IT User
207(1)
8.4.3 Lack of Regulations and Training of Law Enforcements
208(1)
8.5 Internet Users and Population Statistics for Middle East
208(2)
8.6 Internet Users and Population Statistics for North Africa
210(3)
8.7 Case Study
213(6)
8.7.1 Stuxnet
213(1)
8.7.2 W32.Disttrack
214(2)
8.7.3 Duqu
216(2)
8.7.4 Flame
218(1)
8.8 Discussion
219(1)
8.9 Challenges
220(1)
8.10 Conclusion
221(1)
References
222(3)
9 Multilayer Machine Learning-Based Intrusion Detection System
225(24)
Amira Sayed A. Aziz
Aboul Ella Hassanien
9.1 Introduction
226(1)
9.2 Background
227(4)
9.2.1 Intrusion Detection Systems
227(1)
9.2.2 Genetic Algorithm
228(1)
9.2.3 Principal Component Analysis
228(2)
9.2.4 Artificial Immune System
230(1)
9.2.5 Negative Selection Algorithm
230(1)
9.3 The Proposed Multilayer Machine Learning-Based IDS
231(4)
9.3.1 Layer I: Feature Selection Based Principal Components Analysis Layer
232(1)
9.3.2 Layer II: Anomaly Detection-Based Genetic Algorithm with Negative Selection Layer
233(1)
9.3.3 Layer III: Detected Anomalies Classification Layer
234(1)
9.4 Experimental Results and Discussion
235(10)
9.4.1 Data Set
235(1)
9.4.2 Results
236(9)
9.5 Conclusion and Future Work
245(1)
References
246(3)
10 An Improved Key Management Scheme with High Security in Wireless Sensor Networks
249(16)
D. Satish kumar
N. Nagarajan
Ahmad Taher Azar
10.1 Introduction
250(1)
10.2 Related Work
251(2)
10.3 INTK Scheme
253(6)
10.3.1 Initial INTK Setup Process
255(2)
10.3.2 INTK Structure Operation Algorithm
257(1)
10.3.3 INTK Security Feature
258(1)
10.4 Simulation Environment
259(1)
10.5 Results and Discussion
260(3)
10.6 Conclusion
263(1)
References
263(2)
11 Key Pre-distribution Techniques for WSN Security Services
265(22)
Mohamed Mostafa M. Fouad
Aboul Ella Hassanien
11.1 Introduction
265(1)
11.2 Security Services for the WSNs
266(3)
11.2.1 Authentication
266(1)
11.2.2 Data Confidentiality
267(1)
11.2.3 Data Integrity
267(1)
11.2.4 Availability
268(1)
11.2.5 Data Freshness
268(1)
11.2.6 Self-Organization
268(1)
11.2.7 Time Synchronization
269(1)
11.2.8 Secure Localization
269(1)
11.3 WSN's Threat Model
269(1)
11.4 Security Attacks on Sensor Networks
270(2)
11.5 Key Distribution Techniques for Distributed WSNs
272(1)
11.6 Pairwise Key Distributed Schemes
273(7)
11.6.1 Polynomial Based Key Pre-distribution Scheme
274(1)
11.6.2 Probabilistic Key Pre-distribution (PRE)
275(1)
11.6.3 Q-Composite Random Key Pre-distribution Scheme
276(1)
11.6.4 Random Pairwise Keys Scheme
276(1)
11.6.5 Polynomial Pool-Based Key Pre-distribution Scheme
276(2)
11.6.6 Location Based Pairwise Key Scheme
278(1)
11.6.7 Time Based Pairwise Key Scheme
279(1)
11.7 Conclusion and Future Works
280(1)
References
281(6)
Part III Biometrics Technology and Applications
12 Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and Iris
287(34)
N.L Manasa
A. Govardhan
Ch. Satyanarayana
12.1 Introduction
288(6)
12.1.1 Kinds of Information Fusion
293(1)
12.2 Motivation and Challenges
294(3)
12.2.1 Fusion of Multiple Representations of Single Biometric Trait
294(1)
12.2.2 Fusion of Multiple Biometric Traits
295(2)
12.3 Contributions
297(1)
12.4 Fusion of Multiple Representations of Individual Fingerprint, Palmprint and Iris
298(6)
12.4.1 Global Feature Extraction
299(2)
12.4.2 Local Feature Extraction
301(1)
12.4.3 Feature Fusion
302(2)
12.4.4 Feature Matching
304(1)
12.5 Fusion of Multiple Biometric Traits: Fingerprint, Palmprint, Iris
304(11)
12.5.1 Parallel Architecture Based Fusion
309(2)
12.5.2 Hierarchical-Cascading Architecture Based Fusion
311(4)
12.6 Description of Databases
315(1)
12.7 Discussion and Future-Work
316(2)
References
318(3)
13 Biometric Recognition Systems Using Multispectral Imaging
321(28)
Abdallah Meraoumia
Salim Chitroub
Ahmed Bouridane
13.1 Introduction
322(1)
13.2 Related Works
323(1)
13.3 Multimodal Biometric System
324(1)
13.3.1 Fusion at Image Level
324(1)
13.3.2 Fusion at Matching Score Level
325(1)
13.4 Multispectral Paimprint Identification
325(17)
13.4.1 Multispectral Palmprint Image
325(1)
13.4.2 Multispectral Palmprint Database
326(1)
13.4.3 Palmprint Preprocessing
326(1)
13.4.4 Unimodal Identification System Test Results
327(12)
13.4.5 Multimodal Identification System Test Results
339(3)
13.5 Reliability of Multispectral Imaging
342(2)
13.6 Summary and Conclusions
344(1)
References
345(4)
14 Electrocardiogram (ECG): A New Burgeoning Utility for Biometric Recognition
349(34)
Manal Tantawi
Kenneth Revett
Abdel-Badeeh Salem
M. Fahmy Tolba
14.1 Introduction
350(2)
14.2 Heart Fundamentals
352(1)
14.2.1 Heart Anatomy
352(1)
14.2.2 Flow of Blood
352(1)
14.2.3 The Electrical Activity of the Heart
352(1)
14.3 Electrocardiogram
353(2)
14.3.1 ECG and Biometrics
354(1)
14.3.2 ECG Motivation
354(1)
14.3.3 ECG Challenges
354(1)
14.4 Existing ECG Based Biometric Systems
355(16)
14.4.1 Fiducial Based Systems
356(5)
14.4.2 Non-Fiducial Based Systems
361(6)
14.4.3 Combined Fiducial and Non-fiducial Based Systems
367(2)
14.4.4 Fiducial Versus Non-fiducial Based Systems
369(2)
14.5 Methodology
371(4)
14.5.1 Data Preparation
371(1)
14.5.2 Preprocessing
371(1)
14.5.3 Feature Extraction
372(1)
14.5.4 Feature Reduction
372(2)
14.5.5 Classification
374(1)
14.6 Results and Discussion
375(4)
14.6.1 The Global Phase (Significance of the Structure Parts)
376(2)
14.6.2 Local Phase (Significance of Coefficients)
378(1)
14.6.3 Generalization
379(1)
14.7 Conclusion and Future Work
379(1)
References
380(3)
15 Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCA
383(40)
Behzad Nazarbakhsh
Azizah Abd Manaf
15.1 Introduction
384(3)
15.2 Literature Survey
387(7)
15.2.1 Image Acquisition
387(1)
15.2.2 Segmentation
387(3)
15.2.3 Localization
390(1)
15.2.4 Normalization
390(1)
15.2.5 Feature Selection and Extraction
391(1)
15.2.6 Classification
392(2)
15.3 Methodology
394(3)
15.3.1 Image Preprocessing Using for Detection
395(1)
15.3.2 Color Conversion and Segmentation
396(1)
15.3.3 Localization
396(1)
15.3.4 Normalization
396(1)
15.3.5 Face Recognition
396(1)
15.3.6 Feature Extraction
397(1)
15.3.7 Classification
397(1)
15.4 Proposed Method
397(19)
15.4.1 Color Conversion
397(2)
15.4.2 Segmentation
399(3)
15.4.3 Eyes and Mouth Identification and Localization
402(5)
15.4.4 Average Half Face
407(5)
15.4.5 Feature Extraction and Classification
412(4)
15.5 Experimental Result
416(3)
15.5.1 Understanding the Ratio of Training to Test Images Numbers Needed
416(1)
15.5.2 Changing the Training and Test Image Combination
417(1)
15.5.3 Calculating False Positive Rate and Sensibility
418(1)
15.5.4 Performance Comparison of Proposed Method with the Similar Recognition Framework
418(1)
15.6 Conclusion
419(2)
References
421(2)
16 Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues
423(26)
Reham Amin
Tarek Gaber
Ghada ElTaweel
Aboul Ella Hassanien
16.1 Introduction
423(2)
16.2 Traditional Authentication Methods
425(3)
16.2.1 Knowledge-Based Authentication
425(2)
16.2.2 Object-Based Authentication
427(1)
16.3 Biometric Authentication Techniques
428(12)
16.3.1 Biometric Authentication and Its Types
429(1)
16.3.2 Components of a Typical Biometric System
429(1)
16.3.3 How Biometric Authentication Works
429(2)
16.3.4 Performance Evaluation of Biometric Authentication
431(1)
16.3.5 Physiological Biometrics
432(3)
16.3.6 Behavioral Biometrics
435(5)
16.4 Biometric Versus Traditional Authentication
440(1)
16.5 Comparison Among Authentication Techniques
440(1)
16.6 Explicit and Implicit Authentication
441(2)
16.7 Open Issues
443(1)
16.8 Conclusion
443(1)
References
444(5)
Part IV Cloud Security and Data Services
17 Cloud Services Discovery and Selection: Survey and New Semantic-Based System
449(30)
Yasmine M. Afify
Ibrahim F. Moawad
Nagwa L. Badr
M.F. Tolba
17.1 Introduction
450(1)
17.2 Related Work
451(5)
17.2.1 Cloud Service Discovery
451(2)
17.2.2 Cloud Service Selection
453(2)
17.2.3 Cloud Service Discovery and Selection
455(1)
17.2.4 Summary of Key Findings
455(1)
17.3 The Proposed System
456(8)
17.3.1 System Architecture
456(1)
17.3.2 Unified Ontology
456(3)
17.3.3 Service Registration Sub-system
459(1)
17.3.4 Service Discovery Sub-system
460(1)
17.3.5 Service Non-functional Selection Sub-system
461(3)
17.4 Hybrid Service Matchmaking Algorithm
464(4)
17.5 Experimentation and Evaluation
468(5)
17.5.1 Experimental Setup
468(1)
17.5.2 Evaluation Metrics
469(1)
17.5.3 Experimental Scenarios
469(1)
17.5.4 Experimental Evaluation
470(1)
17.5.5 Experiment 2
471(1)
17.5.6 Experiment 3
472(1)
17.6 Conclusion and Future Work
473(1)
References
474(5)
18 Data and Application Security in Cloud
479(18)
Rajesh P. Barnwal
Nirnay Ghosh
Soumya K. Ghosh
18.1 Introduction
480(1)
18.2 Cloud Computing
480(4)
18.2.1 Security in Cloud Computing
483(1)
18.3 Data and Application Security
484(8)
18.3.1 Secure Data Transmission
485(1)
18.3.2 Secure Data Storage and Integrity Verification
486(2)
18.3.3 Prevention Against Attacks
488(2)
18.3.4 Isolation of Customer-Specific Data and Application
490(2)
18.4 Research Directions
492(1)
18.5 Conclusion
493(1)
References
493(4)
19 Security Issues on Cloud Data Services
497(22)
Nour Zawawi
Mohamed Hamdy El-Eliemy
Rania El-Gohary
Mohamed F. Tolba
19.1 Introduction
498(2)
19.2 Security Issues
500(3)
19.2.1 Traditional Security Challenges
501(2)
19.3 Data Integrity
503(3)
19.4 Data Availability
506(2)
19.5 Data Confidentiality
508(2)
19.6 Security and Trust Cloud Data Service
510(4)
19.6.1 EWRDN Service Model
510(3)
19.6.2 EWRDN Utilization of Resources
513(1)
19.7 Conclusion
514(1)
References
515(4)
20 A Reputation Trust Management System for Ad-Hoc Mobile Clouds
519(22)
Ahmed Hammam
Samah Senbel
20.1 Introduction
520(1)
20.2 Related Work
521(1)
20.3 PlanetCloud in Brief
522(1)
20.3.1 Client Agent
523(1)
20.3.2 Cloud Agent
523(1)
20.3.3 Resource Server
523(1)
20.4 Proposed Trust management System for Ad-Hoc Mobile Cloud TMC
523(7)
20.4.1 TMC System Design
523(3)
20.4.2 Simulator
526(4)
20.4.3 Comparison Between TMC and Existing Trust Management Systems for MANET
530(1)
20.5 System Performance Test
530(8)
20.5.1 Performance Test: One
531(1)
20.5.2 Performance Test: Two
532(2)
20.5.3 Performance Test: Three
534(4)
20.6 Conclusion
538(1)
References
538(3)
21 Secured and Networked Emergency Notification Without GPS Enabled Devices
541(24)
Qurban A. Memon
21.1 Introduction
541(3)
21.2 Location Based Service Applications
544(1)
21.3 System Concepts and Related Work
545(3)
21.4 Location Methods and Technologies
548(2)
21.5 Positioning Equations
550(4)
21.6 Operational Considerations and Privacy
554(1)
21.7 A Case Study Experiment
555(5)
21.8 Standardization Efforts
560(1)
21.9 Conclusions
561(1)
References
562(3)
22 Towards Cloud Customers Self-Monitoring and Availability-Monitoring
565
Sameh Hussein
Nashwa Abdelbaki
22.1 Introduction
565(2)
22.2 Monitoring and Controlling Cloud Computing
567(2)
22.2.1 Monitoring and Controlling Cloud Layers
567(2)
22.2.2 Cloud Customer/Provider Conflict of Interests
569(1)
22.3 Cloud Layers Under Cloud Customer Control
569(3)
22.4 Cloud Service Availability
572(2)
22.4.1 Cloud Availability Notable Comments
573(1)
22.4.2 Surveying the Existing Cloud Availability Monitoring Tools
573(1)
22.5 Our Developed Availability Monitoring Tool
574(9)
22.5.1 Flowchart of Our Tool Operation
576(1)
22.5.2 Tool Examination in Test Environment
576(6)
22.5.3 Tool Accumulative Function
582(1)
22.6 Conclusions and Future Work
583(1)
References
584