Author:
Mahipal S.,Ceronmani Sharmila V.
Publisher
Springer Nature Singapore
Reference35 articles.
1. S. Lal, T. Taleb, A. Dutta, NFV: security threats and best practices. IEEE Commun. Mag. 211–217 (2017)
2. R.A. Niazi, Y. Faheem, A Bayesian game-theoretic intrusion detection system for hypervisor-based software defined networks in smart grids. IEEE Access 7, 88656–88672 (2019)
3. J.S. Rajesh, C. Rajamanikkam, K. Chakraborty, S. Roy, Securing data center against power attacks. J. Hardware Syst. Secur. 1–12 (2019)
4. P. Mishra, E.S. Pilli, V. Varadharajan, U. Tupakula, Intrusion detection techniques in cloud environment: a survey. J. Netw. Comput. Appl. 77, 18–47 (2017)
5. S. Iqbal, M.L. Mat Kiah, B. Dhaghighi, M. Hussain, S. Khan, M.K. Khan, K.-K. Raymond Choo, On cloud security attacks: a taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74, 98–120 (2016)