-
1
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, et al., A view of cloud computing, Commun. ACM 53 (4) (2010) 50-58.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
-
3
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
T. Peng, C. Leckie, K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Comput. Surv. 39 (1) (2007) 3.
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
4
-
-
70350422660
-
Chaos theory based detection against network mimicking DDoS attacks
-
A. Chonka, J. Singh, W. Zhou, Chaos theory based detection against network mimicking DDoS attacks, IEEE Commun. Lett. 13 (9) (2009) 717-719.
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.9
, pp. 717-719
-
-
Chonka, A.1
Singh, J.2
Zhou, W.3
-
5
-
-
79957530146
-
Low-rate DDoS attacks detection and traceback by using new information metrics
-
Y. Xiang, K. Li, W. Zhou, Low-rate DDoS attacks detection and traceback by using new information metrics, IEEE Trans. Inf. Forensics Secur. 6 (2) (2011) 426-437.
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
7
-
-
33646742035
-
Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Y. Kim, W.C. Lau, M.C. Chuah, H.J. Chao, Packetscore: a statistics-based packet filtering scheme against distributed denial-of-service attacks, IEEE Trans. Dependable Secure Comput. 3 (2) (2006) 141-155.
-
(2006)
IEEE Trans. Dependable Secure Comput.
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
8
-
-
33749824252
-
ALPi: A DDoS defense system for highspeed networks
-
P.E. Ayres, H. Sun, H.J. Chao, W.C. Lau, ALPi: a DDoS defense system for highspeed networks, IEEE J. Sel. Areas Commun. 24 (10) (2006) 1864-1876.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.10
, pp. 1864-1876
-
-
Ayres, P.E.1
Sun, H.2
Chao, H.J.3
Lau, W.C.4
-
9
-
-
33947503628
-
Defense against spoofed IP traffic using hop-count filtering
-
DOI 10.1109/TNET.2006.890133
-
H. Wang, C. Jin, K.G. Shin, Defense against spoofed IP traffic using hop-count filtering, IEEE/ACM Trans. Netw. 15 (1) (2007) 40-53. (Pubitemid 46464416)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
11
-
-
39049125624
-
Controlling IP spoofing through interdomain packet filters
-
DOI 10.1109/TDSC.2007.70224
-
Z. Duan, X. Yuan, J. Chandrashekar, Controlling IP spoofing through interdomain packet filters, IEEE Trans. Dependable Secure Comput. 5 (1) (2007) 22-36. (Pubitemid 351239530)
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.1
, pp. 22-36
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
13
-
-
40749152296
-
Probabilistic packet marking for large-scale IP traceback
-
DOI 10.1109/TNET.2007.910594
-
M.T. Goodrich, Probabilistic packet marking for large-scale IP traceback, IEEE/ACM Trans. Netw. 16 (1) (2008) 15-24. (Pubitemid 351386752)
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.1
, pp. 15-24
-
-
Goodrich, M.T.1
-
14
-
-
67649889403
-
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
-
Y. Xiang, W. Zhou, M. Guo, Flexible deterministic packet marking: an IP traceback system to find the real source of attacks, IEEE Trans. Parallel Distrib. Syst. 20 (4) (2009) 567-580.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.4
, pp. 567-580
-
-
Xiang, Y.1
Zhou, W.2
Guo, M.3
-
15
-
-
79551523280
-
Traceback of DDoS attacks using entropy variations
-
S. Yu, W. Zhou, R. Doss, W. Jia, Traceback of DDoS attacks using entropy variations, IEEE Trans. Parallel Distrib. Syst. 22 (3) (2011) 412-425.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.3
, pp. 412-425
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Jia, W.4
-
16
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Y. Xie, S. Yu, Monitoring the application-layer DDoS attacks for popular websites, IEEE/ACM Trans. Netw. 17 (1) (2009) 15-25.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.2
-
17
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Y. Xie, S. Yu, A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors, IEEE/ACM Trans. Netw. 17 (1) (2009) 54-65.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.2
-
18
-
-
84872326429
-
An evaluation method of outsourcing services for developing an elastic cloud platform
-
published online
-
W. Dou, L. Qi, X. Zhang, J. Chen, An evaluation method of outsourcing services for developing an elastic cloud platform, J. Supercomput. (2010) http://dx.doi.org/10.1007/s11227-010-0491-2. published online.
-
(2010)
J. Supercomput.
-
-
Dou, W.1
Qi, L.2
Zhang, X.3
Chen, J.4
|