-
3
-
-
79956153885
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
Chonka, A., Xiang, Y., Zhou, W. and Bonti, A. (2010) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of Network and Computer Applications, Vol. 34, No. 1, pp.1097-1107.
-
(2010)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
4
-
-
78751557181
-
A group tracing and filtering tree for REST DDos in cloud computing
-
Fan, L., Wenhua, Z. and Yi, J. (2010) A group tracing and filtering tree for REST DDos in cloud computing, International Journal of Digital Content Technology and its Applications, Vol. 4, No. 9, pp.212-224.
-
(2010)
International Journal of Digital Content Technology and Its Applications
, vol.4
, Issue.9
, pp. 212-224
-
-
Fan, L.1
Wenhua, Z.2
Yi, J.3
-
7
-
-
74349113474
-
On technical security issues in cloud computing
-
Jensen, M., Schwenk, J., Gruschka, N. and Iacono, L.L. (2009) On technical security issues in cloud computing, IEEE International Conference on Cloud Computing,pp.109-116
-
(2009)
IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
8
-
-
79951783095
-
Analysis on cloud-based security vulnerability assessment
-
Li, H-C. and Liang, P-H. (2010) Analysis on cloud-based security vulnerability assessment, IEEE International Conference, pp.490-494.
-
(2010)
IEEE International Conference
, pp. 490-494
-
-
Li, H.-C.1
Liang, P.-H.2
-
9
-
-
78649815408
-
A cooperative intrusion detection system framework for cloud computing networks
-
Lo, C-C., Huang, C-C. and Ku, J. (2010) A cooperative intrusion detection system framework for cloud computing networks, 39th International Conference on Parallel Processing Workshops (ICPPW), pp.280-284.
-
(2010)
39th International Conference on Parallel Processing Workshops (ICPPW)
, pp. 280-284
-
-
Lo, C.-C.1
Huang, C.-C.2
Ku, J.3
-
10
-
-
78650558794
-
Secure virtualization for cloud computing
-
Lombardi, F. and Di Pietro, R. (2010) Secure virtualization for cloud computing, Elsevier Journal of Network and Computer Applications, Vol. 34, No. 4, pp.1113-1122.
-
(2010)
Elsevier Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pietro, R.2
-
11
-
-
85060978839
-
Improving network performance and mitigate DDoS attacks using analytical approach under collaborative software as a service (SaaS) cloud computing environment
-
Mann, P.S. and Kumar, D. (2010) Improving network performance and mitigate DDoS attacks using analytical approach under collaborative software as a service (SaaS) cloud computing environment, International Journal of Computer Science and Technology, Vol. 2, No. 1, pp.119-122.
-
(2010)
International Journal of Computer Science and Technology
, vol.2
, Issue.1
, pp. 119-122
-
-
Mann, P.S.1
Kumar, D.2
-
12
-
-
71449091186
-
Block spoofed packets at source (BSPS): A method for detecting and preventing all types of spoofed source IP packets and SYN flooding packets at source: A theoretical framework
-
Noureldien, N.A. and Hussein, M.O. (2009) Block spoofed packets at source (BSPS): a method for detecting and preventing all types of spoofed source IP packets and SYN flooding packets at source: a theoretical framework, Second International Conference on the Applications of Digital Information and Web Technologies, pp.579-583.
-
(2009)
Second International Conference on the Applications of Digital Information and Web Technologies
, pp. 579-583
-
-
Noureldien, N.A.1
Hussein, M.O.2
-
13
-
-
79957556040
-
3 dimensional security in cloud computing
-
IEEE Computer Society
-
Prasad, P., Ojha, B., Sahi, R.R., Lal, R., Vanish, A. and Goel, U. (2011) 3 dimensional security in cloud computing, 3rd International Conference on Computer Research and Development (ICCRD), IEEE Computer Society, Vol. 3, No. 11, pp.198-201.
-
(2011)
3rd International Conference on Computer Research and Development (ICCRD)
, vol.3
, Issue.11
, pp. 198-201
-
-
Prasad, P.1
Ojha, B.2
Sahi, R.R.3
Lal, R.4
Vanish, A.5
Goel, U.6
-
15
-
-
79961143209
-
Cloud evaluation method of network attack resistance ability
-
Wang, H., Xian, M. and Wang, G. (2011) Cloud evaluation method of network attack resistance ability, IEEE International Conference on Network Computing and Information Security, pp.239-243.
-
(2011)
IEEE International Conference on Network Computing and Information Security
, pp. 239-243
-
-
Wang, H.1
Xian, M.2
Wang, G.3
-
17
-
-
84880192224
-
Security and privacy in cloud computing: A survey
-
IEEE Computer Society
-
Zhou, M., Zhang, R., Xei, W., Qian, W. and Zhou, A. (2010) Security and privacy in cloud computing: a survey, Sixth International Conference on Semantics, Knowledge and Grids, IEEE Computer Society, No. 19, pp.105-112.
-
(2010)
Sixth International Conference on Semantics, Knowledge and Grids
, Issue.19
, pp. 105-112
-
-
Zhou, M.1
Zhang, R.2
Xei, W.3
Qian, W.4
Zhou, A.5
|