Author:
Alanazi Sultan T.,Anbar Mohammed,Karuppayah Shankar,Al-Ani Ahmed K.,Sanjalawe Yousef K.
Reference39 articles.
1. Weng C, Guo M, Luo Y, Li M (2013) Hybrid CPU management for adapting to the diversity of virtual machines. IEEE Trans Comput 62(7):1332–1344
2. Jin H et al (2011) A VMM-based intrusion prevention system in cloud computing environment. J Supercomput, pp 1–19
3. Lonea AM, Popescu DE, Tianfield H (2013) Detecting DDoS attacks in cloud computing environment. Int J Comput Commun Control 8(1):70–78
4. Joshi B, Vijayan AS, Joshi BK (2012) Securing cloud computing environment against DDoS attacks. In: 2012 international conference on computer communication and informatics (ICCCI), pp 1–5
5. Yang SJ, Li YZ (2016) Design issues of enhanced DDoS protecting scheme under the cloud computing environment. In: Proceedings 2016 International Conference Networking and Network Application NaNA 2016, pp 178–183
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献