Author:
Vardhan T. Vishnu,Amritha P. P.,Ambili K. N.
Publisher
Springer Nature Singapore
Reference14 articles.
1. Rakesh N (2016) Performance analysis of anomaly detection of different IoT datasets using cloud micro services. In: International conference on inventive computation technologies (ICICT), vol 3. IEEE, pp 1–5
2. Darwish M, Ouda A, Capretz LF (2013) Cloud-based DDoS attacks and defenses. In: IEEE international conference on information society, pp 67–71
3. Guo J, Guo H (2023) Real-time risk detection method and protection strategy for intelligent ship network security based on cloud computing. Symmetry 15(5):988
4. Xia Y, Zhang Y, Dai L, Zhan Y, Guo Z (2022) A brief survey on recent advances in cloud control systems. IEEE Trans Circuits Syst II Express Briefs 69(7):3108–3114
5. Trostle J (2006) Protecting against distributed denial of service (ddos) attacks using distributed filtering. In: Securecomm and workshops. IEEE, pp. 1–11