共 26 条
[1]
Al-Haidari F., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P1167, DOI 10.1109/TrustCom.2012.146
[2]
Alosaimi W., 2013, Proceedings of the 14th Annual Post Graduates Symposium on the convergence of Telecommunication, Networking and Broadcasting (PGNet), P116
[3]
[Anonymous], 2012, UNDERSTANDING HETERO
[4]
[Anonymous], 2012, P 4 INT C COMP INT C
[5]
Context-aware Job Scheduling for Cloud Computing Environments
[J].
2012 IEEE/ACM FIFTH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2012),
2012,
:255-262
[6]
Bellenger Dominique, 2011, Recent Researches in Computer Science. Proceedings ot the 15th WSEAS International Conference on Computers (Part of the 15th WSEAS CSCC Multiconference), P145
[7]
Securing Cloud Servers against Flooding Based DDOS Attacks
[J].
2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013),
2013,
:524-528
[8]
Dutta K., 2012, Proceedings of the 2012 1st International Conference on Recent Advances in Information Technology (RAIT 2012), P346, DOI 10.1109/RAIT.2012.6194444
[9]
Gligor V.D., 2003, PROC INTLWORKSHOP SE, P80
[10]
Hoff C., 2008, CLOUD COMPUTING SECU