-
1
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
Feb
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing, " EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS- 2009-28, Feb 2009.
-
(2009)
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS- 2009-28
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing, " J. Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
-
(2011)
J. Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
3
-
-
84891353380
-
A survey on security issues in cloud computing
-
R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal, "A survey on security issues in cloud computing, " CoRR, vol. abs/1109.5388, 2011.
-
(2011)
CoRR
, vol.ABS-1109
, pp. 5388
-
-
Bhadauria, R.1
Chaki, R.2
Chaki, N.3
Sanyal, S.4
-
4
-
-
78649336830
-
The geometric efficient matching algorithm for firewalls
-
D. Rovniagin and A. Wool, "The geometric efficient matching algorithm for firewalls, " IEEE Trans. Dependable Sec. Comput., vol. 8, no. 1, pp. 147-159, 2011.
-
(2011)
IEEE Trans. Dependable Sec. Comput.
, vol.8
, Issue.1
, pp. 147-159
-
-
Rovniagin, D.1
Wool, A.2
-
5
-
-
84858632756
-
Detecting and resolving firewall policy anomalies
-
H. Hu, G.-J. Ahn, and K. Kulkarni, "Detecting and resolving firewall policy anomalies, " IEEE Trans. Dependable Sec. Comput., vol. 9, no. 3, pp. 318-331, 2012.
-
(2012)
IEEE Trans. Dependable Sec. Comput.
, vol.9
, Issue.3
, pp. 318-331
-
-
Hu, H.1
Ahn, G.-J.2
Kulkarni, K.3
-
6
-
-
84858285031
-
Performance modeling and analysis of network firewalls
-
K. Salah, K. Elbadawi, and R. Boutaba, "Performance modeling and analysis of network firewalls, " IEEE Transactions on Network and Service Management, vol. 9, no. 1, pp. 12-21, 2012.
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, Issue.1
, pp. 12-21
-
-
Salah, K.1
Elbadawi, K.2
Boutaba, R.3
-
7
-
-
84861634583
-
Can we beat legitimate cyber behavior mimicking attacks from botnets?
-
S. Yu, S. Guo, and I. Stojmenovic, "Can we beat legitimate cyber behavior mimicking attacks from botnets?" in Proceedings of the INFOCOM, 2012.
-
(2012)
Proceedings of the INFOCOM
-
-
Yu, S.1
Guo, S.2
Stojmenovic, I.3
-
8
-
-
79960631828
-
Mitigating ddos attacks with transparent and intelligent fast-flux swarm network
-
no. July/August
-
R. Lua and K. C. Yow, "Mitigating ddos attacks with transparent and intelligent fast-flux swarm network, " IEEE Network, no. July/August, pp. 28-33, 2011.
-
(2011)
IEEE Network
, pp. 28-33
-
-
Lua, R.1
Yow, K.C.2
-
9
-
-
77957788301
-
Ddos defense as a network service
-
P. Du and A. Nakao, "Ddos defense as a network service, " in NOMS, 2010, pp. 894-897.
-
(2010)
NOMS
, pp. 894-897
-
-
Du, P.1
Nakao, A.2
-
10
-
-
84863520750
-
On-demand security architecture for cloud computing
-
no. PrePrints
-
J. Chen, Y. Wang, and X. Wang, "On-demand security architecture for cloud computing, " Computer, vol. 99, no. PrePrints, 2012.
-
(2012)
Computer
, vol.99
-
-
Chen, J.1
Wang, Y.2
Wang, X.3
-
11
-
-
84856328279
-
Edos-shield - A two-steps mitigation technique against edos attacks in cloud computing
-
M. H. Sqalli, F. Al-Haidari, and K. Salah, "Edos-shield - A two-steps mitigation technique against edos attacks in cloud computing, " in UCC, 2011, pp. 49-56.
-
(2011)
UCC
, pp. 49-56
-
-
Sqalli, M.H.1
Al-Haidari, F.2
Salah, K.3
-
13
-
-
84860543902
-
Discriminating ddos attacks from flash crowds using flow correlation coefficient
-
S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, "Discriminating ddos attacks from flash crowds using flow correlation coefficient, " IEEE Transactions on Parallel Distributed Systems, vol. 23, no. 6, pp. 794- 805, 2012.
-
(2012)
IEEE Transactions on Parallel Distributed Systems
, vol.23
, Issue.6
, pp. 794-805
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Xiang, Y.5
Tang, F.6
-
14
-
-
70349659341
-
Adaptive early packet filtering for protecting firewalls against dos attacks
-
A. El-Atawy, E. Al-Shaer, T. Tran, and R. Boutaba, "Adaptive early packet filtering for protecting firewalls against dos attacks, " in Proceedings of the INFOCOM, 2009.
-
(2009)
Proceedings of the INFOCOM
-
-
El-Atawy, A.1
Al-Shaer, E.2
Tran, T.3
Boutaba, R.4
-
15
-
-
84886782636
-
-
CloudWatch, http://aws.amazon.com/cloudwatch/.
-
CloudWatch
-
-
-
16
-
-
0004210802
-
-
Wiley Interscience, Theory
-
L. Kleinrock, Queueing Systems. Wiley Interscience, 1975, vol. I: Theory.
-
(1975)
Queueing Systems
, vol.1
-
-
Kleinrock, L.1
|