-
2
-
-
84988224529
-
-
S. Yu, Y. Tian, S. Guo, and D. Wu, "Can we beat ddos attacks in clouds'?" pp. 1-1, 2013.
-
(2013)
Can We Beat Ddos Attacks in Clouds'?
, pp. 1-1
-
-
Yu, S.1
Tian, Y.2
Guo, S.3
Wu, D.4
-
3
-
-
84555190519
-
Ddos: Threats and mitigation
-
S. Mansfield-Devine, "Ddos: threats and mitigation," Network Security, vol. 2011, no. 12, pp. 5-12, 2011.
-
(2011)
Network Security
, vol.2011
, Issue.12
, pp. 5-12
-
-
Mansfield-Devine, S.1
-
4
-
-
80052138945
-
Hacktivism: Assessing the damage
-
[Onlinel]
-
S. M. Devine, "Hacktivism: assessing the damage," Network Security, vol. 2011, no. 8, pp. 5-13, 2011. [Onlinel]. Available: http://www.sciencedirect.com/science/article/pii/S 1353485811700848
-
(2011)
Network Security
, vol.2011
, Issue.8
, pp. 5-13
-
-
Devine, S.M.1
-
6
-
-
77950347409
-
A view of cloud computing
-
Apr.
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
7
-
-
78649322624
-
Review: A survey on security issues in service delivery models of cloud computing
-
Jan.
-
S. Subashini and V. Kavitha, "Review: A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1-11, Jan. 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
8
-
-
84904207683
-
An architecture to manage performance and reliability on hybrid cloud-based firewalling
-
F. Guenane, H. Boujezza, M. Nogeuira, and G. Pujolle, "An architecture to manage performance and reliability on hybrid cloud-based firewalling," in Network Operations and Management Symposium (NOMS), 2014 IEEE, 2014.
-
(2014)
Network Operations and Management Symposium (NOMS), 2014 IEEE
-
-
Guenane, F.1
Boujezza, H.2
Nogeuira, M.3
Pujolle, G.4
-
9
-
-
84996540949
-
-
Nov. [Online]
-
"Cert, denial of service attack," Nov. 2013. [Online]. Available: http://www.cert.org/tech-tips/denial-of-service.html
-
(2013)
Cert, Denial of Service Attack
-
-
-
10
-
-
84912084652
-
-
Nov. [Online]
-
"Cert, botnet," Nov. 2013. [Online]. Available: http://www.us-cert.gov/ncas/tips/ST06-001
-
(2013)
Cert, Botnet
-
-
-
11
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
Apr. [Online]
-
J. Mirkovic and P. Reiher, "A taxonomy of ddos attack and ddos defense mechanisms," SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39-53, Apr. 2004. [Online]. Available: http://doi.acm.org/10.1145/997150.997156
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
12
-
-
0034497721
-
Distributed denial of service attacks
-
F. Lau, S. Rubin, M. Smith, and L. Trajkovic, "Distributed denial of service attacks," in Systems, Man, and Cybernetics, 2000 IEEE International Conference on, vol. 3, 2000, pp. 2275-2280 vol.3.
-
(2000)
Systems, Man, and Cybernetics, 2000 IEEE International Conference on
, vol.3
, pp. 2275-2280
-
-
Lau, F.1
Rubin, S.2
Smith, M.3
Trajkovic, L.4
-
13
-
-
84865275889
-
Simple ways to dodge the {DDoS} bullet
-
[Online]
-
F. Malecki, "Simple ways to dodge the {DDoS} bullet," Network Security, vol. 2012, no. 8, pp. 18-20, 2012. [Online]. Available: http://www.sciencedirect.eom/science/article/pii/S 1353485812700752
-
(2012)
Network Security
, vol.2012
, Issue.8
, pp. 18-20
-
-
Malecki, F.1
-
14
-
-
0038823982
-
Distributed denial of service (ddos) mitigation tools: Philip hunter
-
[Online]
-
"Distributed denial of service (ddos) mitigation tools: Philip hunter," Network Security, vol. 2003, no. 5, pp. 12-14, 2003. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S 1353485803005105
-
(2003)
Network Security
, vol.2003
, Issue.5
, pp. 12-14
-
-
-
16
-
-
84874762752
-
A strong authentication for virtual networks using eap-tls smart cards
-
F. Guenane, N. Samet, G. Pujolle, and P. Urien, "A strong authentication for virtual networks using eap-tls smart cards," in Global Information Infrastructure and Networking Symposium (GIIS), 2012, 2012, pp. 1-6.
-
(2012)
Global Information Infrastructure and Networking Symposium (GIIS), 2012
, pp. 1-6
-
-
Guenane, F.1
Samet, N.2
Pujolle, G.3
Urien, P.4
|