Author:
Kwon Hyukmin,Kim Taesu,Yu Song Jin,Kim Huy Kang
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing v2.1 (2009)
2. McHugh, J.: Intrusion and intrusion detection. International Journal of Information Security 1, 14–35 (2001)
3. Lecture Notes in Computer Science;S. Rawat,2004
4. Crovella, M.E., Bestavros, A.: Self-similarity in World Wide Web traffic: Evidence and possible causes. IEEE/ACM Transactions on networking 5(6), 835–845 (1997)
5. Willinger, W., Taqqu, M.S., Sherman, R., Wilson, D.V.: Self-similarity through high-variability; statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking 5(1), 71–86 (1997)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献