标题
A survey and taxonomy of DoS attacks in cloud computing
作者
关键词
-
出版物
Security and Communication Networks
Volume 9, Issue 16, Pages 3724-3751
出版商
Wiley
发表日期
2016-07-13
DOI
10.1002/sec.1539
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Towards workflow scheduling in cloud computing: A comprehensive analysis
- (2016) Mohammad Masdari et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An overview of virtual machine placement schemes in cloud computing
- (2016) Mohammad Masdari et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Improving network intrusion detection system performance through quality of service configuration and parallel technology
- (2015) Waleed Bul'ajoul et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- From high-availability to collapse: quantitative analysis of “Cloud-Droplet-Freezing” attack threats to virtual machine migration in cloud computing
- (2014) Yichuan Wang et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Detecting DDoS Attacks in Cloud Computing Environment
- (2014) Alina Madalina Lonea et al. International Journal of Computers Communications & Control
- Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures
- (2014) Francesco Palmieri et al. JOURNAL OF SUPERCOMPUTING
- A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
- (2014) Junho Choi et al. SOFT COMPUTING
- Bandwidth Distributed Denial of Service: Attacks and Defenses
- (2013) Moti Geva et al. IEEE SECURITY & PRIVACY
- A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
- (2013) Zhiyuan Tan et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis
- (2012) Ryan Shea et al. IEEE Systems Journal
- Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis
- (2012) Sandeep Yadav et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Addressing cloud computing security issues
- (2010) Dimitrios Zissis et al. Future Generation Computer Systems-The International Journal of eScience
- Understanding Cloud Computing Vulnerabilities
- (2010) Bernd Grobauer et al. IEEE SECURITY & PRIVACY
- Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
- (2010) Ashley Chonka et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Chaos theory based detection against network mimicking DDoS attacks
- (2009) Ashley Chonka et al. IEEE COMMUNICATIONS LETTERS
- Detecting DRDoS attacks by a simple response packet confirmation mechanism
- (2008) Hiroshi Tsunoda et al. COMPUTER COMMUNICATIONS
- Information theory based detection against network behavior mimicking DDoS attacks
- (2008) Shui Yu et al. IEEE COMMUNICATIONS LETTERS
- DDoS attack detection method using cluster analysis
- (2007) Keunsoo Lee et al. EXPERT SYSTEMS WITH APPLICATIONS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started