共 195 条
[91]
Jaber AN, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2013), P179, DOI 10.1109/ICCSCE.2013.6719955
[92]
Security in Multi-Tenancy Cloud
[J].
44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY,
2010,
:35-41
[93]
Jensen M., 2011, Proceedings of the 2011 IEEE 35th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2011). Volume II: Workshops, P392, DOI 10.1109/COMPSACW.2011.72
[94]
The impact of flooding attacks on network-based services
[J].
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY,
2008,
:509-+
[95]
A survey of attacks on web services: Classification and countermeasures
[J].
COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT,
2009, 24 (04)
:185-197
[96]
On Technical Security Issues in Cloud Computing
[J].
CLOUD: 2009 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING,
2009,
:109-+
[97]
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures
[J].
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2,
2009,
:25-32
[98]
Ji S., 2012, ADV DIFFER EQU, V2012, P1, DOI DOI 10.1016/J.CAGE0.2012.01.004
[99]
John C.Roberts., 2011, Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD '11, P15, DOI 10.1145/2047456.2047458
[100]
Jun Xu, 2015, Cloud Computing and Security. First International Conference, ICCCS 2015. Revised Selected Papers: LNCS 9483, P218, DOI 10.1007/978-3-319-27051-7_19