Author:
Chaudhry Shehzad Ashraf,Kim I Luk,Rho Seungmin,Farash Mohammad Sabzinejad,Shon Taeshik
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference51 articles.
1. Zhangjie, F., Xingming, S., Qi, L., Lu, Z., Jiangang, S.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transact. Commun. 98(1), 190–200 (2015)
2. Badve, O.P., Gupta, B., Yamaguchi, S., Gou, Z.: Ddos detection and filtering technique in cloud environment using garch model. In: Proceedings of the 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), pp. 584–586. (2015)
3. Gupta, B.: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, Hershey (2016)
4. Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Transact. Comput. 64(2), 425–437 (2015)
5. Gupta, B., Badve, O.P.: Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment. Neu. Comput. Appl. (2016) doi:
10.1007/s00521-016-2317-5
Cited by
50 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献