共 25 条
[1]
Almulla S.A., 2010, 2010 2 INT C ENG SYS, P1
[2]
Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques
[J].
INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016,
2016, 9870
:303-315
[3]
Securing Cloud Servers against Flooding Based DDOS Attacks
[J].
2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013),
2013,
:524-528
[4]
Chouhan V., 2013, INT J COMPUT SCI ELE, V1, P2315
[5]
A confidence-based filtering method for DDoS attack defense in cloud environment
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (07)
:1838-1850
[6]
Haddadi Mohamed, 2018, EDPACS: The EDP Audit, Control, and Security Newsletter, V57, P1, DOI 10.1080/07366981.2018.1453101
[7]
Hurwitz J., 2010, CLOUD COMPUTING DUMM
[8]
Janarthanan T, 2017, PROC IEEE INT SYMP, P1881, DOI 10.1109/ISIE.2017.8001537
[9]
Joshi A., 2012, INT GREEN COMPUTING, P1
[10]
Karnwal T, 2013, ADV INTELL SYST, V182, P459