共 18 条
[1]
Insider threat Detection using Log analysis and Event Correlation
[J].
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA),
2015, 45
:436-445
[2]
Chonka Ashley, 2009, IEEE COMMUNICATIONS
[3]
A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing
[J].
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013,
2013, 10
:340-347
[4]
DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Traffic
[J].
BIG DATA, CLOUD AND COMPUTING CHALLENGES,
2015, 50
:30-36
[5]
Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47
[6]
Iyengar N. Ch S. N., 2014, International Journal of Communication Networks and Information Security, V6, P233
[7]
An Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2015, 9 (07)
:17-35
[10]
Jeyanthi N., 2012, International Journal of Communication Networks and Information Security, V4, P163