1. Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25, 2245–2254 (2014)
2. Mell, P.M., Grance, T.: The NIST definition of cloud computing, Gaithersburg, MD (2011)
3. Ricci, R., Eide, E.: The CloudLab Team: Introducing CloudLab: Scientific Infrastructure for Advancing Cloud Architectures and Applications. login, vol. 39. USENIX (2014)
4. Albin, E.: A comparative analysis of the Snort and Suricata intrusion-detection systems (2011)
5. Irwin, B., van Riel, J.-P.: Using InetVis to evaluate Snort and Bro scan detection on a network telescope. In: Goodall, J.R., Conti, G., Ma, K.L. (eds.) Mathematics and Visualization, pp. 255–273. Springer, Heidelberg (2008)