Author:
Sree T. Raja,Bhanu S. Mary Saira
Publisher
Springer Science and Business Media LLC
Reference39 articles.
1. Mell, P.; Grance, T.: The NIST definition of cloud computing. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf . (2011). Accessed 12 Dec 2016
2. Iqbal, S.; Kiah, M.L.M.; Dhaghighi, B.; Hussain, M.; Khan, S.; Khurram Khan, M.; Raymond Choo, K.-K.: On cloud security attacks: a taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74, 98–120 (2016)
3. Dou, W.; Chen, Q.; Chen, J.: A confidence-based filtering method for ddos attack defense in cloud environment. Future Gener. Comput. Syst. 29(7), 1838–1850 (2013)
4. Cyberthreat. Live cyber attack threat map. https://threatmap.checkpoint.com/ThreatPortal/livemap.html (2015). [Online; Accessed 10 May 2016]
5. DDoSquick_guide. Ddos quick guide us-cert. https://www.us-cert.gov/security-publications/DDoS-Quick-Guide , 1–4, 2014 (2015). [Online; Accessed 10 May 2016]
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献