Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Saxena, R., Dey, S.: collaborative approach for data integrity verification in cloud computing, In: SNDS 2014, Communications in Computer and Information Science (CCIS), vol. 420, pp. 1–15. Springer, Berlin (2014)
2. Saxena, R., Dey, S.: Cloud shield: effective solution for DDoS in cloud, In: IDCS 2015, Lecture Notes in Computer Science (LNCS), vol. 9258, pp. 3–10. Springer, Berlin (2015)
3. Ruj, S., Saxena R.: Securing cloud data. In: Cloud computing with e-science applications, ISBN:978-1-4665-9115-8, pp. 41–72. CRC Press, Boca Raton (2015)
4. Saxena, R., Dey, S.: Cloud Audit: A Data Integrity Verification Approach for Cloud Computing, Procedia Computer Science, vol. 89, pp. 142–151, ISSN 1877-0509.
https://doi.org/10.1016/j.procs.2016.06.024
(2016)
5. Dittrich D.: The tribe flood network, distributed denial of service attack tool (1991).
http://staff.washington.edu/dittrich/misc/tfn.analysis
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient Load Balancing of Resources for Different Cloud Service Providers in Cloud Computing;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2023-01-04
2. A Novel Approach for Service Selection and Ranking in Federated Cloud;Key Digital Trends Shaping the Future of Information and Management Science;2023
3. Malicious behavior detection in cloud using self‐optimized dynamic kernel convolutional neural network;Transactions on Emerging Telecommunications Technologies;2022-02-02