Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference31 articles.
1. Saxena, R., Dey, S.: Cloud audit: a data integrity verification approach for cloud computing. Proc. Comput. Sci. 89, 142–151 (2016).
https://doi.org/10.1016/j.procs.2016.06.024
2. Saxena, R., Dey, S.: Collaborative approach for data integrity verification in cloud computing. In: SNDS 2014, Communications in Computer and Information Science (CCIS), vol. 420, pp. 1–15. Springer, Berlin Heidelberg (2014)
3. Saxena, R., Dey, S.: Cloud shield: effective solution for DDoS in cloud. In: IDCS 2015, Lecture Notes in Computer Science (LNCS), vol. 9258, pp. 3–10. Springer, Berlin Heidelberg (2015)
4. Ruj, S., Saxena, R.: Securing cloud data. In: Terzo, O., Mossucca, L. (eds.) Cloud Computing with e-Science Applications, pp. 41–72. CRC Press, Boca Raton (2015). ISBN: 978-1-4665-9115-8
5. Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM Sigcomm Comput. Commun. Rev. 34(2), 39–53 (2004)
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献