Author:
Mohan M.,Tamizhazhagan V.,Balaji S.
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference56 articles.
1. Ko, R., Lee, S.S.G.: Cloud computing vulnerability incidents: a statistical overview. Available from https://downloads.Cloudsecurityalliance.org/initiatives/cvwg/CSA_Whitepaper_Cloud_Computing_Vulnerability_Incidents.zip. Accessed on Sep 2014.
2. Divyasree, I.R., Selvamani K.: Defeating the distributed denial of service attack in cloud environment: a survey. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), IEEE, Kollam, pp.1–8, (2017)
3. Yan, Q., Yu, F., Gong, Q., Li, J.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602–622 (2016)
4. Kushwah, G.S., Ali, S.T.: Detecting DDoS attacks in cloud computing using ANN and black hole optimization. In: 2nd International Conference on Telecommunication and Networks (TEL-NET 2017), (2017)
5. . Karnwal, S. Thandapanii, Gnanasekaran, A.: A filter tree approach to protect cloud computing against XML DDoS and HTTP DDoS attack. In: Intelligent Informatics, Advances in Intelligent Systems and Computing, vol. 182. Springer, Berlin, (2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献