共 18 条
- [1] Ajagekar S.K., P IEEE INT C COMP IN, DOI [10.1109/ICCIC.2016.7919656, DOI 10.1109/ICCIC.2016.7919656]
- [2] Apiecionek L, 2014, COMM COM INF SC, V424, P405
- [3] Banafar H., 2014, INT J COMPUTER APPL, V90
- [4] Bongiovanni W., 2016, P IEEE 40 C LOC COMP, V1, P209, DOI [10.1109/LCN.2015.7366308, DOI 10.1109/LCN.2015.7366308]
- [5] Buyya R., 2017, SCI DIRECT COMPUTER, V105, P30, DOI [10.1016/j.comcom.2017.03.010, DOI 10.1016/J.COMCOM.2017.03.010]
- [6] Cloud H., 2017, TRUE ENTERPRISE CLOU
- [7] E-Tutorials, 2017, NETW CISC AD SEC ALG
- [8] Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1197 - 1227
- [9] Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 212 - 217
- [10] Hameed S, 2016, IEEE IFIP NETW OPER, P488, DOI 10.1109/NOMS.2016.7502848