-
2
-
-
84856361952
-
-
available at
-
R. Knode, "BP Fuels Cloud Computing Interest", available at http://www.trustedcloudservices.com/Individual-Case-Studies/bp-fuels-cloud- computing-interest.
-
BP Fuels Cloud Computing Interest
-
-
Knode, R.1
-
4
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: vision, hype and reality for delivering computing as the 5th utility", Future Generation Computer Systems, vol. 25 (6), 2009.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
5
-
-
84856320336
-
Cloud Computing Security: From DDoS (Distributed Denial of Service) to EDoS (Economic Denial of Sustainability)
-
Retrieved November 27, available at
-
C. Hoff, "Cloud Computing Security: From DDoS (Distributed Denial Of Service) to EDoS (Economic Denial of Sustainability)", Blog, Retrieved November 27, 2008, available at http://rationalsecurity.typepad.com/blog/2008/ 11/cloud-computing-security-from-ddos-distributed-denial-of-service-to-edos- economic-denial-of-sustaina.html
-
(2008)
Blog
-
-
Hoff, C.1
-
6
-
-
84856323637
-
sPoW: On-Demand Cloud-based eDDoS Mitigation Mechanism
-
S. HinKhor and A. Nakao, "sPoW: On-Demand Cloud-based eDDoS Mitigation Mechanism", HotDep (Fifth Workshop on Hot Topics in System Dependability), Lisbon, Portugal, 2009.
-
HotDep (Fifth Workshop on Hot Topics in System Dependability), Lisbon, Portugal, 2009
-
-
HinKhor, S.1
Nakao, A.2
-
7
-
-
77954896637
-
-
Website, available at
-
"Amazon CloudWatch", Amazon Website, available at http://aws.amazon.com/cloudwatch/
-
Amazon CloudWatch
-
-
-
8
-
-
85084095139
-
Reconstructing hash reversal based proof of work schemes
-
J. Green, J. Juen, O. Fatemieh, R. Shankesi, D. Jin, and C. Gunter, "Reconstructing hash reversal based proof of work schemes", in LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, Boston, MA, March 2011.
-
LEET'11 Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, Boston, MA, March 2011
-
-
Green, J.1
Juen, J.2
Fatemieh, O.3
Shankesi, R.4
Jin, D.5
Gunter, C.6
-
9
-
-
21244469720
-
Sos: Secure overlay services
-
D. Keromytis, V. Misra, and D. Rubenstein, "Sos: Secure overlay services", In Proceedings of the Con-ference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIG-COMM'02), August 2002.
-
Proceedings of the Con-ference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIG-COMM'02), August 2002
-
-
Keromytis, D.1
Misra, V.2
Rubenstein, D.3
-
10
-
-
18844457631
-
Websos: An overlay-based system for protecting web servers from denial of service attacks
-
August
-
A. Stavrou, D. L. Cook, W. G. Morein, A. D. Keromytis, V. Misra, and D. Rubenstein, "Websos: An overlay-based system for protecting web servers from denial of service attacks", the International Journal of Computer and Telecommunications Networking, vol. 48(5), pp.781-807, August 2005.
-
(2005)
The International Journal of Computer and Telecommunications Networking
, vol.48
, Issue.5
, pp. 781-807
-
-
Stavrou, A.1
Cook, D.L.2
Morein, W.G.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
11
-
-
51749088327
-
Fosel: Filtering by helping an overlay secure layer to mitigate dos attacks
-
Cambridge, MA (USA), July
-
H. Beitollahi and G. Deconinck, "Fosel: Filtering by helping an overlay secure layer to mitigate dos attacks", In Proceedings of the 7th IEEE Int. Symp. on Network Computing and Applications (NCA-2008), pages 19-28, Cambridge, MA (USA), July 2008.
-
(2008)
Proceedings of the 7th IEEE Int. Symp. on Network Computing and Applications (NCA-2008)
, pp. 19-28
-
-
Beitollahi, H.1
Deconinck, G.2
-
12
-
-
77957788301
-
DDoS defense as a network service
-
April
-
D. Ping and A. Nakao, "DDoS defense as a network service", Network Operations and Management Symposium (NOMS), IEEE, Osaka, pp. 894-897, April 2010.
-
(2010)
Network Operations and Management Symposium (NOMS), IEEE, Osaka
, pp. 894-897
-
-
Ping, D.1
Nakao, A.2
-
13
-
-
12244282921
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security", In Proceedings of Eurocrypt, 2003.
-
Proceedings of Eurocrypt, 2003
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
16
-
-
32544431722
-
Understanding when location-hiding using overlay networks is feasible
-
DOI 10.1016/j.comnet.2005.07.022, PII S1389128605002409
-
J. Wang and A. Chien, "Understanding when location-hiding using overlay networks is feasible", Journal of Computer Networks, vol. 50(6), pp.763-780, April 2006. (Pubitemid 43234333)
-
(2006)
Computer Networks
, vol.50
, Issue.6
, pp. 763-780
-
-
Wang, J.1
Chien, A.A.2
-
17
-
-
18744376590
-
Using graphic turing tests to counter automated DDoS attacks against web servers
-
W. G. Morein, A. Stavrou, D. L. Cook, A. D. Keromytis, V. Misra, and D. Rubenstein, "Using graphic turing tests to counter automated DDoS attacks against web servers", in ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
18
-
-
70349314701
-
CAPTCHA Security: A Case Study
-
Aug.
-
J. Yan and A.s. El Ahmad, "CAPTCHA Security: A Case Study", Security & Privacy, IEEE, vol. 7, pp. 22-28, Aug. 2009.
-
(2009)
Security & Privacy, IEEE
, vol.7
, pp. 22-28
-
-
Yan, J.1
El Ahmad, A.S.2
-
19
-
-
79958705292
-
Mitigating denial of service attack using CAPTCHA mechanism
-
ACM New York, NY, USA
-
M. Mehra, M. Agarwal, R. Pawar, and D. Shah, "Mitigating denial of service attack using CAPTCHA mechanism", ICWET Workshop on Emerging Trends in Technology, ACM New York, NY, USA, pp. 284-287, 2011.
-
(2011)
ICWET Workshop on Emerging Trends in Technology
, pp. 284-287
-
-
Mehra, M.1
Agarwal, M.2
Pawar, R.3
Shah, D.4
-
20
-
-
79961228109
-
A new architecture for the generation of picture based CAPTCHA
-
April
-
S.B.E Raj, D. Devassy, and J. Jagannivas, "A new architecture for the generation of picture based CAPTCHA", Electronics Computer Technology (ICECT) 2011, 2011 3rd International Conference, Kanyakumari, India, pp. 67-71, April 2011.
-
(2011)
Electronics Computer Technology (ICECT) 2011, 2011 3rd International Conference, Kanyakumari, India
, pp. 67-71
-
-
Raj, S.B.E.1
Devassy, D.2
Jagannivas, J.3
-
21
-
-
77954801271
-
Mitigating IP Spoofing by Validating BGP Routes Updates
-
May
-
J. Israr, M. Guennoun, and H. Mouftah, "Mitigating IP Spoofing by Validating BGP Routes Updates", IJCSNS International Journal of Computer Science and Network Security, vol. .9, no. 5, May 2009.
-
(2009)
IJCSNS International Journal of Computer Science and Network Security
, vol.9
, Issue.5
-
-
Israr, J.1
Guennoun, M.2
Mouftah, H.3
-
22
-
-
70350660771
-
TrueIP: Prevention of IP spoofing attacks using identity-based cryptography
-
ACM
-
C. Schridde, M. Smith, and B. Freisleben, "TrueIP: prevention of IP spoofing attacks using identity-based cryptography", SIN '09 Proceedings of the 2nd international conference on Security of information and networks, ACM, pp. 128-137, 2009.
-
(2009)
SIN '09 Proceedings of the 2nd International Conference on Security of Information and Networks
, pp. 128-137
-
-
Schridde, C.1
Smith, M.2
Freisleben, B.3
-
23
-
-
77950553020
-
A Cryptographic Approach to Defend against IP Spoofing
-
M. Ravi, S. Narasimman, G. K. Arun, and D. Karthikeyan, "A Cryptographic Approach to Defend against IP Spoofing", Communications in Computer and Information Science, CCIS, vol. 70, pp. 290-296, 2010.
-
(2010)
Communications in Computer and Information Science, CCIS
, vol.70
, pp. 290-296
-
-
Ravi, M.1
Narasimman, S.2
Arun, G.K.3
Karthikeyan, D.4
-
24
-
-
80054075678
-
An Autonomous Framework for Early Detection of Spoofed Flooding Attacks
-
Jan.
-
M. Subramanian and T. Angamuthu, "An Autonomous Framework for Early Detection of Spoofed Flooding Attacks", International Journal of Network Security, vol. 10, no. 1, pp. 39-50, Jan. 2010.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.1
, pp. 39-50
-
-
Subramanian, M.1
Angamuthu, T.2
-
25
-
-
84856323641
-
System and method for detecting and eliminating IP spoofing in a data transmission network
-
US Patent 7,865,945 B2, Google Patents, Jan
-
C.F. Sharp and S. Dark, "System and method for detecting and eliminating IP spoofing in a data transmission network", US Patent 7,865,945 B2, Google Patents, Jan 2011.
-
(2011)
-
-
Sharp, C.F.1
Dark, S.2
-
26
-
-
84856320344
-
Methods and Systems for Load Balancing Using Forecasting and Overbooking Techniques
-
US Patent, Pub no. 2011/0078318 A1, Google Patents, March
-
N. Desai, S. Dillon, and D. Stone, "Methods and Systems for Load Balancing Using Forecasting and Overbooking Techniques", US Patent, Pub no. 2011/0078318 A1, Google Patents, March 2011.
-
(2011)
-
-
Desai, N.1
Dillon, S.2
Stone, D.3
-
27
-
-
85109115579
-
Balancing gossip exchanges in networks with firewalls
-
J. Leitão, R. Renesse, and L. Rodrigues, "Balancing gossip exchanges in networks with firewalls", IPTPS'10 Proceedings of the 9th international conference on Peer-to-peer systems, USA, 2010.
-
IPTPS'10 Proceedings of the 9th International Conference on Peer-to-peer Systems, USA, 2010
-
-
Leitão, J.1
Renesse, R.2
Rodrigues, L.3
-
28
-
-
66549092515
-
A stateful CSG-based distributed firewall architecture for robust distributed security
-
Jan
-
V. Ramsurrun and K. Soyjaudah, "A stateful CSG-based distributed firewall architecture for robust distributed security", Communication Systems and Networks and Workshops, First International COMSNETS, Bangalore, pp. 1-10, Jan 2009.
-
(2009)
Communication Systems and Networks and Workshops, First International COMSNETS, Bangalore
, pp. 1-10
-
-
Ramsurrun, V.1
Soyjaudah, K.2
-
29
-
-
84856344131
-
Method for protecting a firewall load balancer from a denial of service attack
-
US Patent 7,770,215 B2, Google Patents, Aug
-
C. O'rourke, G. Shah, L. Menditto, M. Albert, et al., "Method for protecting a firewall load balancer from a denial of service attack", US Patent 7,770,215 B2, Google Patents, Aug 2010.
-
(2010)
-
-
O'Rourke, C.1
Shah, G.2
Menditto, L.3
Albert, M.4
-
30
-
-
80455164421
-
Cloud Computing Security
-
June
-
S. Carlin and K. Curran, "Cloud Computing Security", International Journal of Ambient Computing and Intelligence, Vol. 3, No. 1, pp:38-46, June 2011.
-
(2011)
International Journal of Ambient Computing and Intelligence
, vol.3
, Issue.1
, pp. 38-46
-
-
Carlin, S.1
Curran, K.2
-
31
-
-
84856361949
-
-
White Paper, Jun 8, available at
-
VMware, Inc, White Paper, "vShield Edge Design Guide", Jun 8, 2011, available at http://www.vmware.com/files/pdf/techpaper/vShield-Edge- Design-Guide-WP.pdf
-
(2011)
vShield Edge Design Guide
-
-
-
32
-
-
84856318701
-
-
available at
-
Cisco White Paper, "Secure Virtual Applications and Data Centers", 2011. available at http://www.cisco.com/en/US/solutions/ collateral/ns340/ns517/ns224/ns1097/white-paper-181-652663.html
-
(2011)
Secure Virtual Applications and Data Centers
-
-
-
33
-
-
84856320345
-
-
White paper, available at
-
Savvis, Inc, White paper, "Securing-Virtual-Compute-Infrastructure- in-the-Cloud", 2011, available at http://www.savvis.com/en-US/Info-Center/ Documents/HOS-WhitePaper- SecuringVirutalComputeInfrastructureintheCloud.pdf
-
(2011)
Securing-Virtual-Compute-Infrastructure-in-the-Cloud
-
-
-
34
-
-
77953064515
-
New network security based on cloud computing
-
March
-
W. Huang and J. Yang, "new network security based on cloud computing", Education Technology and Computer Science (ETCS), Second International Workshop, Wuhan, pp. 604-609, March 2010.
-
(2010)
Education Technology and Computer Science (ETCS), Second International Workshop, Wuhan
, pp. 604-609
-
-
Huang, W.1
Yang, J.2
-
36
-
-
0034336855
-
Analytical solution of finite capacity M/D/1 queues
-
DOI 10.1239/jap/1014843086
-
O. Brun, and M., Garcia, "Analytical Solution of Finite Capacity M/D/1 Queues", Journal of Applied Probability, vol. 37, no. 4, pp. 1092-1098, December 2000. (Pubitemid 33241074)
-
(2000)
Journal of Applied Probability
, vol.37
, Issue.4
, pp. 1092-1098
-
-
Brun, O.1
Garcia, J.-M.2
-
37
-
-
0035024566
-
Inferring network characteristics via moment-based estimators
-
S. Alouf, S. Nain, and D. Towsley, "Inferring Network Characteristics via Moment-Based Estimators", Proceeding of IEEE INFOCOM 2001, pp. 1045-1054, Anchorage, Alaska, April 2001. (Pubitemid 32478436)
-
(2001)
Proceedings - IEEE INFOCOM
, vol.2
, pp. 1045-1054
-
-
Alouf, S.1
Nain, P.2
Towsley, D.3
-
39
-
-
85013592037
-
Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level
-
August
-
W. Willinger, M. Taqqu, R. Sherman, and D. Wilson, "Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level", Proceedings of ACM SIGCOMM, Cambridge, Massachusetts, pp. 100-113, August 1995.
-
(1995)
Proceedings of ACM SIGCOMM, Cambridge, Massachusetts
, pp. 100-113
-
-
Willinger, W.1
Taqqu, M.2
Sherman, R.3
Wilson, D.4
-
40
-
-
0009481579
-
The Nature of theBeast: Recent Traffic Measurements from an Internet Backbone
-
K. C. Claffy, G. Miller, and K. Thompson, "The Nature of theBeast: Recent Traffic Measurements from an Internet Backbone", In the Proceedings of INET 1998, Geneva, Switzerland, July 1998.
-
Proceedings of INET 1998, Geneva, Switzerland, July 1998
-
-
Claffy, K.C.1
Miller, G.2
Thompson, K.3
-
43
-
-
84870631425
-
-
available at
-
Amazon EC2 Pricing, available at http://aws.amazon.com/ec2/pricing/
-
Amazon EC2 Pricing
-
-
|