Author:
Modi Chirag N.,Acha Kamatchi
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference67 articles.
1. Mell P, Grance T (2011) The nist definition of cloud computing [Online]. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf . Accessed 1 Nov 2015
2. Reuben JS (2007) A survey on virtual machine security. Hels Univ Technol 2:36
3. Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592
4. Amazon Web Services (2016) AWS best practices for ddos resiliency [online]. https://d0.awsstatic.com/whitepapers/DDoS_White_Paper_June2015.pdf . Accessed 30 Oct 2015
5. Baig Z, Binbeshr F (2013) Controlled virtual resource access to mitigate economic denial of sustainability (edos) attacks against cloud infrastructures. In: International Conference on Cloud Computing and Big Data (CloudCom-Asia). IEEE, pp 346–353
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献