-
1
-
-
0347868796
-
Handling Distributed Denial-of-Service Attacks
-
Janczewski, L. J., D.Reamer, J. Brendel. Handling Distributed Denial-of-Service Attacks. - Information Security Technical Report, Vol. 6, 2001, 37-44.
-
(2001)
Information Security Technical Report
, vol.6
, pp. 37-44
-
-
Janczewski, L.J.1
Reamer, D.2
Brendel, J.3
-
2
-
-
79957736179
-
Distributed Denial of Service Attack Detection Using an Ensemble of Neural Classifier
-
Kumar, P. A. R., S. Selvakumar. Distributed Denial of Service Attack Detection Using an Ensemble of Neural Classifier. - Computer Communications, Vol. 34, 2011, 1328-1341.
-
(2011)
Computer Communications
, vol.34
, pp. 1328-1341
-
-
Kumar, P.A.R.1
Selvakumar, S.2
-
3
-
-
84859434887
-
Evaluating a Migration-Based Response to DoS Attacks in a System of Distributed Auctions
-
Lent, R. Evaluating a Migration-Based Response to DoS Attacks in a System of Distributed Auctions. - Computers & Amp Security, Vol. 31, 2012, 327-343.
-
(2012)
Computers & Amp Security
, vol.31
, pp. 327-343
-
-
Lent, R.1
-
4
-
-
84871803744
-
Security Issues Occur in Cloud Computing and There Solutions
-
Singh, K., I. Kharbanda, N. Kaur. Security Issues Occur in Cloud Computing and There Solutions. - International Journal on Computer Science and Engineering, Vol. 4, 2012, 945-949.
-
(2012)
International Journal on Computer Science and Engineering
, vol.4
, pp. 945-949
-
-
Singh, K.1
Kharbanda, I.2
Kaur, N.3
-
6
-
-
84871785685
-
Fault Tolerant Workflow Scheduling Based on Replication and Resubmission of Tasks in Cloud Computing
-
Jayadivya, S. K., J. S. Nirmala, M. S. Bhanu. Fault Tolerant Workflow Scheduling Based on Replication and Resubmission of Tasks in Cloud Computing. - International Journal on Computer Science and Engineering, Vol. 4, 2012, 996-1006.
-
(2012)
International Journal on Computer Science and Engineering
, vol.4
, pp. 996-1006
-
-
Jayadivya, S.K.1
Nirmala, J.S.2
Bhanu, M.S.3
-
7
-
-
84876134839
-
An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends Computer Networks
-
Patcha, A., J.-M. Park. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends, Computer Networks. - The International Journal of Computer and Telecommunications Networking, Vol. 1, 2007, 3448-3470.
-
(2007)
The International Journal of Computer and Telecommunications Networking
, vol.1
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
8
-
-
84871793779
-
Improved Self Fused Check Pointing Replication for Handling Multiple Faults in Cloud Computing
-
Bansal, S., S. Sharma, I. Trivedi, M. Ghosh. Improved Self Fused Check Pointing Replication for Handling Multiple Faults in Cloud Computing. - International Journal on Computer Science and Engineering, Vol. 4, 2012, 1146-1152.
-
(2012)
International Journal on Computer Science and Engineering
, vol.4
, pp. 1146-1152
-
-
Bansal, S.1
Sharma, S.2
Trivedi, I.3
Ghosh, M.4
-
10
-
-
77953077374
-
Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites
-
ACM
-
Jung, J., B. Krishnamurthy, M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. - In: WWW '02 Proceedings of the 11th International Conference on World Wide Web, ACM, 2002, 293-304.
-
(2002)
In: WWW '02 Proceedings of the 11th International Conference on World Wide Web
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
11
-
-
84924375780
-
Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds
-
Kandula, S., D. Katabi, M. Jacob, A. Berger. Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. - In: NSDI '05: 2nd Symposium on Networked Systems Design & Implementation, 2005, 287-300.
-
(2005)
In: NSDI '05: 2nd Symposium on Networked Systems Design & Implementation
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
12
-
-
80052432981
-
A Fuzzy Pattern-Based Filtering Algorithm for Botnet Detection Computer Networks
-
Wang, K., C-Y Huang, S-J Lin, Y-D Lin. A Fuzzy Pattern-Based Filtering Algorithm for Botnet Detection, Computer Networks. - The International Journal of Computer and Telecommunications Networking, Vol. 55, 2011, 3275-3286.
-
(2011)
The International Journal of Computer and Telecommunications Networking
, vol.55
, pp. 3275-3286
-
-
Wang, K.1
Huang, C.-Y.2
Lin, S.-J.3
Lin, Y.-D.4
-
13
-
-
84876100808
-
Cloud Computing Security Considerations, IT Division
-
DOEACC Society, Gorakhpur Centre, Gorakhpur, India IEEE
-
Tripathi, A., A. Mishra. Cloud Computing Security Considerations, IT Division. DOEACC Society, Gorakhpur Centre, Gorakhpur, India, 2010, IEEE.
-
(2010)
-
-
Tripathi, A.1
Mishra, A.2
-
16
-
-
84876113524
-
The Aussie Who Blitzed Visa, MasterCard and PayPal with the Low Orbit Ion Cannon
-
9 December
-
Moses. The Aussie Who Blitzed Visa, MasterCard and PayPal with the Low Orbit Ion Cannon, 9 December, 2010. http:// www.smh.com.au/ technology/ security/ the-aussie-who-blitzed-visa-mastercard- and -paypal-with-the-low-orbit-ion-cannon-20101209-18qr1.html
-
(2010)
-
-
Moses1
-
17
-
-
84876127381
-
-
http:// www.opnet.com/ news/ press_releases/ pr-2010/OPNET-Introduces-Cloud-Readiness-Service-pr.html
-
-
-
-
18
-
-
84876108644
-
-
http://www.opnet.com./services/brochures/OPNETCloudReadiness.pdf
-
-
-
|