共 15 条
[2]
[Anonymous], 2015, CLOUD USER BEHAV ASS, DOI DOI 10.1007/S13198-015-0411-1
[3]
[Anonymous], 2017, US FED CLOUD COMP MA
[4]
Bendale Y., 2013, International Journal of Computer Applications, P31, DOI DOI 10.5120/12122-8376
[6]
Giri M. S., 2015, INT J COMPUTER APPL, V122, P27, DOI DOI 10.5120/21674-4762
[7]
Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment
[J].
2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS,
2015,
:212-217
[8]
Kim Jaekwang, 2008, 4 INT C INT ENV IE 0, DOI [10.1049/cp:20081126, DOI 10.1049/CP:20081126]
[9]
Li Hong, 2010, KEY TECHNOLOGY REALI
[10]
Li-Qin T., 2010, 2010 INT C COMP APPL