共 22 条
[1]
Hu P, Dhelim S, Ning H, Qiu T., Survey on fog computing: architecture, key technologies, applications and open issues, Journal of network and computer applications, 15, 98, pp. 27-42, (2017)
[2]
Chaudhary D, Bhushan K, Gupta BB., Survey on DDoS attacks and defense mechanisms in cloud and fog computing, International Journal of E-Services and Mobile Applications, 10, 3, pp. 61-83, (2018)
[3]
Zhou H, Ouyang X, Ren Z, Su J, de Laat C, Zhao Z., A blockchain based witness model for trustworthy cloud service level agreement enforcement, IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 1567-1575, (2019)
[4]
Jayaraman I, Panneerselvam AS., A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud, Journal of Ambient Intelligence and Humanized Computing, 12, 5, pp. 4911-4924, (2021)
[5]
Amjad A, Alyas T, Farooq U, Tariq MA., Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm, EAI Endorsed Transactions on Scalable Information Systems, 6, 26, (2019)
[6]
Zekri M, El Kafhali S, Aboutabit N, Saadi Y., DDoS attack detection using machine learning techniques in cloud computing environments, IEEE 3rd international conference of cloud computing technologies and applications (CloudTech), pp. 1-7, (2017)
[7]
Vimala S, Dhas J., SDN based DDoS attack detection system by exploiting ensemble classification for cloud computing, International Journal of Intelligent Engineering and Systems, 11, pp. 282-291, (2018)
[8]
Khan N, Abdullah J, Khan AS., Defending malicious script attacks using machine learning classifiers, Wireless Communications and Mobile Computing, (2017)
[9]
Khan N, Abdullah J, Khan AS., A Dynamic Method of Detecting Malicious Scripts Using Classifiers, Advanced Science Letters, 23, 6, pp. 5352-5355, (2017)
[10]
Wani AR, Rana QP, Saxena U, Pandey N., Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques, IEEE Amity International conference on artificial intelligence, pp. 870-875, (2019)