共 37 条
[1]
Abouzakhar N., Bakar A., A chi-square testing-based intrusion detection model, CFET, (2010)
[2]
Alani M.M., Securing the cloud: Threats, attacks and mitigation techniques, Journal of Advanced Computer Science and Technology, 3, 2, pp. 202-213, (2014)
[3]
Anderson M., Black Hat 2014: How to Hack the Cloud to Mine Crypto Currency, (2014)
[4]
Annual Worldwide Infrastructure Security Report, (2016)
[5]
Anwar Z., Malik A.W., Can a DDoS attack meltdown my data center? A simulation study and defense strategies, IEEE Communications Letters, 18, 7, pp. 1175-1178, (2014)
[6]
Bali M.S., Khurana S., Effect of latency on network and end user domains in cloud computing, ICGCE, pp. 777-782, (2013)
[7]
Burst Start and Burst Rate, (2015)
[8]
Choi J., Choi C., Ko B., Choi D., Kim P., Detecting web based DDoS attack using MapReduce operations in cloud computing environment, Journal of Internet Services and Information Security, 3, 3-4, pp. 28-37, (2013)
[9]
Information Bulletin, I-020: Cisco 7xx Password Buffer Overflow, (1999)
[10]
Security Guidance for Critical Areas of Focus in Cloud Computing V2, 1, (2009)