Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev
Passive security intelligence to analyze the security risks of mobile/BYOD activitiesMarc StoecklinKapil Singhet al.2016IBM J. Res. Dev