Author:
Rajendran Rakesh,Santhosh Kumar S. V. N.,Palanichamy Yogesh,Arputharaj Kannan
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference29 articles.
1. Khorshed, M.T., Shawkat Ali, A.B.M., Wasimi, S.A.: Classifying different denial-of-service attacks in cloud computing using rule-based learning. Secur. Commun. Netw. 5(11), 1235–1247 (2012)
2. Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 3(1), 80–94 (2015)
3. Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., Kannan, A.: Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J. Wirel. Commun. Netw. 271(1), 1–16 (2013)
4. Arul Xavier, V.M., Annadurai, S.: Chaotic social spider algorithm for load balance aware task scheduling in cloud computing. Clust. Comput. (2018). https://doi.org/10.1007/s10586-018-1823-x
5. Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., Kannan, A.: Secured temporal log management techniques for cloud. Procedia Comput. Sci. 46, 589–595 (2015)
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献