Author:
Kumar Anmol,Somani Gaurav
Publisher
Springer Nature Singapore
Reference59 articles.
1. Cloudfare: DDoS attack statistics (2021). https://www.cloudfare.com/en-in/learning/ddos/famous-ddos-attacks/ (retrieved on December 21, 2021)
2. Diego Asturias: DDoS attack statistics (2021). https://www.cloudbric.com/blog/2021/04/most-notorious-ddos-attacks-in-history-2021-update/ (retrieved on December 21, 2021)
3. Singh, G.K., Somani, G.: Cross-VM Attacks: attack taxonomy, defense mechanisms, and new directions. In: Versatile Cybersecurity, pp. 257–286. Springer (2018)
4. Bazm, M.-M., Lacoste, M., Südholt, M., Menaud, J.-M.: Isolation in cloud computing infrastructures: new security challenges. Ann. Telecommun. 74(3), 197–209 (2019)
5. Bhushan, K., Gupta, B.B.: Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing. Multimed. Tools Appl. 78(4), 4267–4298 (2019)