-
1
-
-
84903464893
-
A dual mechanism for defeating DDoS attacks in cloud computing model
-
March
-
Upma Goyal, Gayatri Bhatti and Sandeep Mehmi, "A Dual Mechanism for defeating DDoS Attacks in Cloud Computing Model," International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 3, March 2013.
-
(2013)
International Journal of Application or Innovation in Engineering & Management
, vol.2
, Issue.3
-
-
Goyal, U.1
Bhatti, G.2
Mehmi, S.3
-
3
-
-
84881234353
-
Cloud QoS, high availability and service security issues with solutions
-
Zakarya, M. and A. A. Khan, "Cloud QoS, High Availability and Service Security Issues with Solutions". IJCSNS, 2012.
-
(2012)
IJCSNS
-
-
Zakarya, M.1
Khan, A.A.2
-
4
-
-
84887389506
-
Survey on security issues in cloud computing and associated mitigation techniques
-
June
-
Rohit Bhadauria and Sugata Sanyal, "Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques.," International Journal of Computer Applications 47(18), June 2012, pp:47-66.
-
(2012)
International Journal of Computer Applications
, vol.47
, Issue.18
, pp. 47-66
-
-
Bhadauria, R.1
Sanyal, S.2
-
5
-
-
84907315065
-
-
The NIST Definition of Cloud Computing", Version, 15
-
Peter Mell and Tim Grance, "The NIST Definition of Cloud Computing", Version, 15, http://csrc. nist. gov /publications/nistpubs/800- 145/SP800-145. pdf., 2011.
-
(2011)
-
-
Mell, P.1
Grance, T.2
-
6
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks, tools, and countermeasures
-
September
-
Stephen M. Specht and Ruby B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures" Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 543-550, September 2004
-
(2004)
Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems
, pp. 543-550
-
-
Specht, S.M.1
Lee, R.B.2
-
8
-
-
84907375248
-
-
http://www. riorey. com/x-resources /2011/RioRey-Taxonomy-DDoS-Attacks-2. 2-2011. pdf
-
-
-
-
9
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-the-art
-
April
-
C. Douligeris and A. Mitrokotsa, "DDoS attacks and defense mechanisms: Classification and state-of-the-art," Computer Networks: the Int. J. Computer and Telecommunications Networking, Vol. 44, No. 5, April 2004, pp. 643-666.
-
(2004)
Computer Networks: The Int. J. Computer and Telecommunications Networking
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
10
-
-
0034229418
-
Defeating distributed denial of service attacks
-
july
-
X. Geng, A. B. Whinston, "Defeating Distributed Denial of Service attacks," IEEE IT Professional 2, july 2000, pp. 36-42
-
(2000)
IEEE IT Professional 2
, pp. 36-42
-
-
Geng, X.1
Whinston, A.B.2
-
11
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France
-
J. Mirkovic, G. Prier, P. Reiher, "Attacking DDoS at the source," 10 th IEEE International Conference on Network Protocols, Paris, France, 2002, pp. 312-321.
-
(2002)
10 Th IEEE International Conference on Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
13
-
-
84889472982
-
A survey of DDoS attacks and some DDoS defense mechanisms
-
Puneet Zaroo," A Survey of DDoS attacks and some DDoS defense mechanisms," Advanced Information Assurance (CS 626), 2003.
-
(2003)
Advanced Information Assurance (CS 626)
-
-
Zaroo, P.1
-
16
-
-
1242350156
-
A feeedback mechanism for mitigating Denial of Service attacks against differentiated services clients
-
Monterey, CA, October
-
M. B. Geoffrey, G. Xie, "A feeedback mechanism for mitigating Denial of Service attacks against differentiated services clients," the 10th International Conference on Telecommunications systems, Monterey, CA, October 2002, pp. 204-213.
-
(2002)
The 10th International Conference on Telecommunications Systems
, pp. 204-213
-
-
Geoffrey, M.B.1
Xie, G.2
-
17
-
-
84907364033
-
Cloud security: Attacks and current defenses
-
June 4-5, Albany, New York
-
Gehana Booth, Andrew Soknacki, and Anil Somayaji, "Cloud Security: Attacks and Current Defenses," 8th Annual Symposium On Information Assurance (Asia'13), June 4-5, Albany, New York, 2013, pp. 56-62.
-
(2013)
8th Annual Symposium on Information Assurance (Asia'13)
, pp. 56-62
-
-
Booth, G.1
Soknacki, A.2
Somayaji, A.3
-
18
-
-
84884300634
-
An enhanced entropy approach to detect and prevent DDoS in cloud environment
-
N Jeyanthi, N. Ch. S. N Iyengar, P C Mogan Kumar, Kannammal A 2013 "An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment", International Journal of Communication Networks and Information Security, Vol. 5, No. 2, pp. 163-173.
-
(2013)
International Journal of Communication Networks and Information Security
, vol.5
, Issue.2
, pp. 163-173
-
-
Jeyanthi, N.1
Iyengar, N.C.H.S.N.2
Mogan Kumar, P.C.3
Kannammal, A.4
-
19
-
-
77954931494
-
Intrusion detection for grid and cloud computing
-
July/August
-
K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, " Intrusion Detection for Grid and Cloud Computing," IEEEComputer Society, Vol. 12, July/August 2010, pp. 38-43.
-
(2010)
IEEE Computer Society
, vol.12
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.B.3
Westphall, C.M.4
-
20
-
-
77950559014
-
Intrusion detection in cloud
-
S. Roschke, F. Cheng, and C. Meinel, "Intrusion Detection in Cloud," 8th IEEE International Conference on Dependable, Automatic and Secure Computing, pp. 729-734.
-
8th IEEE International Conference on Dependable, Automatic and Secure Computing
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
21
-
-
84907365229
-
A detailed analysis of the issues and solutions for securing data in cloud
-
ISSN: 2278-0661, Sep-Oct
-
Anindita Saha1, Abhijit Das "A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud," IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 5, Sep-Oct. 2012, PP 11-18.
-
(2012)
IOSR Journal of Computer Engineering (IOSRJCE)
, vol.4
, Issue.5
, pp. 11-18
-
-
Saha, A.1
Das, A.2
-
22
-
-
84871762721
-
Packet resonance strategy: A spoof attack detection and prevention mechanism in cloud computing environment
-
Jeyanthi, N., Iyengar, N. Ch. S. N. 2012, "Packet resonance strategy: A spoof attack detection and prevention mechanism in cloud computing environment", International Journal of Communication Networks and Information Security, Vol. 4, No. 3, pp. 163-173
-
(2012)
International Journal of Communication Networks and Information Security
, vol.4
, Issue.3
, pp. 163-173
-
-
Jeyanthi, N.1
Iyengar, N.2
|