共 17 条
[1]
Detection Techniques for DDoS Attacks in Cloud Environment: Review Paper
[J].
INTELLIGENT AND INTERACTIVE COMPUTING,
2019, 67
:337-354
[2]
Alhenaki L, 2019, 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS)
[3]
Bakr A., 2019, INT J ADV SCI TECHNO, V28, P187
[4]
Ismail M.N., 2012, Int. J. Comput. Sci. Secur, V6, P226
[5]
Jia Q., 2013, ICCCN, 2013, P1, DOI [10.1109/ICCCN.2013.6614155, DOI 10.1109/ICCCN.2013.6614155]
[6]
John Jomina, 2019, Advances in Big Data and Cloud Computing. Proceedings of ICBDCC18. Advances in Intelligent Systems and Computing (AISC 750), P11, DOI 10.1007/978-981-13-1882-5_2
[7]
Jun Feng, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P251, DOI 10.1109/ICPPW.2010.42
[8]
Kansal V, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), P334, DOI 10.1109/COMPTELIX.2017.8003989
[10]
Mell P, 2010, COMMUN ACM, V53, P50