1. Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach
2. A Comprehensive Survey of Fault Tolerance Techniques in Cloud Computing;H.Agarwal;International Conference on Computing and Network Communications (CoCoNet),2016
3. Ahmadi, M., Vali, M., Moghaddam, F., Hakemi, A., & Madadipouya, K. (2015). A Reliable User Authentication and Data Protection Model in Cloud Computing Environments. International Conference on Information, System and Convergence Applications.
4. The impact of big data analytics on business competitiveness;H.Alsghaier;Proceedings of the New Trends in Information Technology,2017
5. Anderson, R., & Biham, E. (1996). Two Practical and Provably Secured Block Ciphers: BEAR and LION. In Fast Software Encryption,Third International Workshop Proceedings. Springer-Verlag.