Author:
Alavizadeh Hooman,Kim Dong Seong,Jang-Jaccard Julian
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference61 articles.
1. Cloud computing security issues and challenges;Popović,2010
2. Y. Zhu, H. Hu, G. Ahn, D. Huang, S. Wang, Towards temporal access control in cloud computing, in: Proc. of Annual IEEE International Conference on Computer Communications, INFOCOM 2012, 2012, pp. 2576–2580.
3. Q. Jia, H. Wang, D. Fleck, F. Li, A. Stavrou, W. Powell, Catch me if you can: A cloud-enabled ddos defense, in: Proc. of the the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, 2014.
4. Assessing the effectiveness of moving target defenses using security models;Hong;IEEE Trans. Dependable Secure Comput.,2016
5. Openflow random host mutation: transparent moving target defense using software defined networking;Jafarian,2012
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献