Author:
Velliangiri S.,Premalatha J.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference22 articles.
1. Alsafi, H.M., Abduallah, W.M., Pathan, A.S.K.: IDPS: an integrated intrusion handling model for cloud (2012).
arXiv:1203.3323
2. Kumar, U., Gohil, B.N.: A survey on intrusion detection systems for cloud computing environment. Int. J. Comput. Appl. 109(1) (2015)
3. Narwane, S.V., Vaikol, S.L.: Intrusion detection system in cloud computing environment. In: InInternational Conference on Advances in Communication and Computing Technologies (ICACACT) (2012)
4. Zlomislić, V., Fertalj, K., Sruk, V.: Denial of service attacks, defences and research challenges. Clust. Comput. 20(1), 661–4671 (2017)
5. Saied, A., Overill, R.E., Radzik, T.: Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172, 385–393 (2016)
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献