Affiliation:
1. School of Computer Science and Engineering; Southeast University; Nanjing, Jiangsu 210096 China
2. Key Laboratory of Computer Network and Information Integration (Southeast University); Ministry of Education; Nanjing, Jiangsu 210096 China
Funder
National Key Basic Research Program
National Natural Science Foundation of China
China high technology 863 program
China Specialized Research Fund for the Doctoral Program of Higher Education
Jiangsu Provincial Science and Technology Plan Program
Key Laboratory of Computer Network and Information Integration of Ministry of Education of China
Jiangsu Provincial Key Laboratory of Network and Information Security
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Theoretical Computer Science,Software
Reference28 articles.
1. Chen Y Paxson V Katz RH Whats new about cloud computing security 2010 20 2010 2010 2015
2. The notorious nine: cloud computing top threats in 2013 https://cloudsecurityalliance.org/download/the-notorious-nine-cloud-computing-top-threats-in-2013
3. Lei A Youchan Z The solution of DDOS attack based on multi-agent Educational and Information Technology (ICEIT), 2010 International Conference on, vol. 2. IEEE Chongqing, China 2010 V2 530
4. Can we beat DDOS attacks in clouds?;Yu;IEEE Transactions on Parallel & Distributed Systems,,2013
5. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks;Chonka;Journal of Network and Computer Applications,2011
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献