-
1
-
-
84870792225
-
A study on security threats in cloud
-
Jeyanthi, N., Shabeeb, H. and Iyengar, N.C.S., "A study on security threats in cloud", International Journal of Cloud Computing and Services Science (IJ-CLOSER), Vol. 1, No. 3, (2012), 84-88.
-
(2012)
International Journal of Cloud Computing and Services Science (IJ-CLOSER)
, vol.1
, Issue.3
, pp. 84-88
-
-
Jeyanthi, N.1
Shabeeb, H.2
Iyengar, N.C.S.3
-
2
-
-
78049381211
-
Overcourt: Ddos mitigation through credit-based traffic segregation and path migration
-
Du, P. and Nakao, A., "Overcourt: Ddos mitigation through credit-based traffic segregation and path migration", Computer Communications, Vol. 33, No. 18, (2010), 2164-2175.
-
(2010)
Computer Communications
, vol.33
, Issue.18
, pp. 2164-2175
-
-
Du, P.1
Nakao, A.2
-
3
-
-
79957918464
-
Trustguard: A flow-level reputation-based ddos defense system
-
Liu, H., Sun, Y., Valgenti, V.C. and Kim, M.S., "Trustguard: A flow-level reputation-based ddos defense system", in Consumer Communications and Networking Conference (CCNC), IEEE, (2011), 287-291.
-
(2011)
Consumer Communications and Networking Conference (CCNC), IEEE
, pp. 287-291
-
-
Liu, H.1
Sun, Y.2
Valgenti, V.C.3
Kim, M.S.4
-
4
-
-
77954321139
-
Fine-grained capabilities for flooding ddos defense using client reputations
-
Natu, M. and Mirkovic, J., "Fine-grained capabilities for flooding ddos defense using client reputations", in Proceedings of the workshop on Large scale attack defense, ACM. (2007), 105-112.
-
(2007)
Proceedings of the Workshop on Large Scale Attack Defense, ACM
, pp. 105-112
-
-
Natu, M.1
Mirkovic, J.2
-
5
-
-
72849125444
-
Discriminating ddos flows from flash crowds using information distance
-
Yu, S., Thapngam, T., Liu, J., Wei, S. and Zhou, W., "Discriminating ddos flows from flash crowds using information distance", in Network and System Security,. NSS'09. Third International Conference on, IEEE. (2009), 351-356.
-
(2009)
Network and System Security,. NSS'09. Third International Conference On, IEEE
, pp. 351-356
-
-
Yu, S.1
Thapngam, T.2
Liu, J.3
Wei, S.4
Zhou, W.5
-
6
-
-
84860543902
-
Discriminating ddos attacks from flash crowds using flow correlation coefficient
-
Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y. and Tang, F., "Discriminating ddos attacks from flash crowds using flow correlation coefficient", Parallel and Distributed Systems, IEEE Transactions on, .No. 6, (2012), 1073-1080.
-
(2012)
Parallel and Distributed Systems, IEEE Transactions on
, Issue.6
, pp. 1073-1080
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Xiang, Y.5
Tang, F.6
-
7
-
-
79960570117
-
Discriminating ddos attack traffic from flash crowd through packet arrival patterns
-
Thapngam, T., Yu, S., Zhou, W. and Beliakov, G., "Discriminating ddos attack traffic from flash crowd through packet arrival patterns", in Computer Communications Workshops (INFOCOM WKSHPS), Conference on, IEEE., (2011), 952-957.
-
(2011)
Computer Communications Workshops (INFOCOM WKSHPS), Conference On, IEEE
, pp. 952-957
-
-
Thapngam, T.1
Yu, S.2
Zhou, W.3
Beliakov, G.4
-
9
-
-
33750366503
-
DDoS defense by offense
-
DOI 10.1145/1151659.1159948
-
Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D. and Shenker, S., "Ddos defense by offense", in ACM SIGCOMM Computer Communication Review, ACM. Vol. 36, (2006), 303-314. (Pubitemid 44623736)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 303-314
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
10
-
-
84860629853
-
Multi-level authentication technique for accessing cloud services
-
Dinesha, H. and Agrawal, V., "Multi-level authentication technique for accessing cloud services", in Computing, Communication and Applications (ICCCA), International Conference on, IEEE. (2012), 1-4.
-
(2012)
Computing, Communication and Applications (ICCCA), International Conference On, IEEE
, pp. 1-4
-
-
Dinesha, H.1
Agrawal, V.2
-
11
-
-
78650878375
-
Httpreject: Handling overload situations without losing thecontact to the user
-
Schneider, J. and Koch, S., "Httpreject: Handling overload situations without losing thecontact to the user", in Computer Network Defense (EC2ND), European Conference on, IEEE., (2010), 29-34.
-
(2010)
Computer Network Defense (EC2ND), European Conference On, IEEE
, pp. 29-34
-
-
Schneider, J.1
Koch, S.2
|