-
1
-
-
84864872037
-
Security and privacy governance in cloud computing via SLAS and a policy orchestration service
-
M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson, "Security and privacy governance in cloud computing via SLAS and a policy orchestration service, " in Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670-674.
-
Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci.
, vol.2012
, pp. 670-674
-
-
Mont, M.C.1
McCorry, K.2
Papanikolaou, N.3
Pearson, S.4
-
4
-
-
35549011836
-
Robust and efficient detection of DDoS attacks for large-scale internet
-
K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci, "Robust and efficient detection of DDoS attacks for large-scale internet, " Comput. Netw., vol. 51, no. 18, pp. 5036-5056, 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.18
, pp. 5036-5056
-
-
Lu, K.1
Wu, D.2
Fan, J.3
Todorovic, S.4
Nucci, A.5
-
5
-
-
17744379157
-
Defending against low-rate TCP attacks: Dynamic detection and protection
-
H. Sun, J. C. S. Lui, and D. K. Yau, "Defending against low-rate TCP attacks: Dynamic detection and protection, " in Proc. 12th IEEE Int. Conf. Netw. Protocol., 2004, pp. 196-205.
-
(2004)
Proc. 12th IEEE Int. Conf. Netw. Protocol.
, pp. 196-205
-
-
Sun, H.1
Lui, J.C.S.2
Yau, D.K.3
-
6
-
-
1242287727
-
Low-rate TCP-Targeted denial of service attacks: The shrew vs. The mice and elephants
-
A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-Targeted denial of service attacks: The shrew vs. the mice and elephants, " in Proc. Int. Conf. Appl., Technol., Archit., Protocols Comput. Commun., 2003, pp. 75-86.
-
(2003)
Proc. Int. Conf. Appl., Technol., Archit., Protocols Comput. Commun.
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
7
-
-
25844458510
-
Reduction of quality (RoQ) attacks on internet end-systems
-
Mar.
-
M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang, "Reduction of quality (RoQ) attacks on internet end-systems, " in Proc. IEEE Int. Conf. Comput. Commun., Mar. 2005, pp. 1362-1372.
-
(2005)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 1362-1372
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.4
-
8
-
-
77957662754
-
A queuing analysis for low-rate DoS attacks against application servers
-
X. Xu, X. Guo, and S. Zhu, "A queuing analysis for low-rate DoS attacks against application servers, " in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 500-504.
-
(2010)
Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security
, pp. 500-504
-
-
Xu, X.1
Guo, X.2
Zhu, S.3
-
9
-
-
77249126901
-
Thwarting zero-day polymorphic worms with network-level length-based signature generation
-
Feb.
-
L. Wang, Z. Li, Y. Chen, Z. Fu, and X. Li, "Thwarting zero-day polymorphic worms with network-level length-based signature generation, " IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 53-66, Feb. 2010.
-
(2010)
IEEE/ACM Trans. Netw.
, vol.18
, Issue.1
, pp. 53-66
-
-
Wang, L.1
Li, Z.2
Chen, Y.3
Fu, Z.4
Li, X.5
-
10
-
-
79956153885
-
Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks
-
Jul.
-
A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, "Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks, " J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1097-1107, Jul. 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.4
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
11
-
-
80054081474
-
Architecturing a sky computing platform
-
D. Petcu, C. Craciun, M. Neagul, S. Panica, B. Di Martino, S. Venticinque, M. Rak, and R. Aversa, "Architecturing a sky computing platform, " in Proc. Int. Conf. Towards Serv.-Based Int., 2011, vol. 6569, pp. 1-13.
-
(2011)
Proc. Int. Conf. Towards Serv.-Based Int.
, vol.6569
, pp. 1-13
-
-
Petcu, D.1
Craciun, C.2
Neagul, M.3
Panica, S.4
Di Martino, B.5
Venticinque, S.6
Rak, M.7
Aversa, R.8
-
12
-
-
51449088190
-
Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks
-
U. Ben-Porat, A. Bremler-Barr, and H. Levy, "Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks, " in Proc. IEEE Int. Conf. Comput. Commun., 2008, pp. 2297-2305.
-
(2008)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 2297-2305
-
-
Ben-Porat, U.1
Bremler-Barr, A.2
Levy, H.3
-
13
-
-
84884992379
-
Defending against next generation through network/endpoint collaboration and interaction
-
S. Antonatos, M. Locasto, S. Sidiroglou, A. D. Keromytis, and E. Markatos, "Defending against next generation through network/endpoint collaboration and interaction, " in Proc. IEEE 3rd Eur. Int. Conf. Comput. Netw. Defense, 2008, vol. 30, pp. 131-141.
-
(2008)
Proc. IEEE 3rd Eur. Int. Conf. Comput. Netw. Defense
, vol.30
, pp. 131-141
-
-
Antonatos, S.1
Locasto, M.2
Sidiroglou, S.3
Keromytis, A.D.4
Markatos, E.5
-
14
-
-
39049092820
-
Backtracking algorithmic complexity attacks against a NIDS
-
Dec.
-
R. Smith, C. Estan, and S. Jha, "Backtracking algorithmic complexity attacks against a NIDS, " in Proc. Annu. Comput. Security Appl. Conf., Dec. 2006, pp. 89-98.
-
(2006)
Proc. Annu. Comput. Security Appl. Conf.
, pp. 89-98
-
-
Smith, R.1
Estan, C.2
Jha, S.3
-
15
-
-
34247378261
-
Improving secure server performance by re-balancing SSL/TLS handshakes
-
Apr.
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Improving secure server performance by re-balancing SSL/TLS handshakes, " in Proc. ACM Symp. Inf., Apr. 2005, pp. 26-34.
-
(2005)
Proc. ACM Symp. Inf.
, pp. 26-34
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
16
-
-
85060085357
-
Low-rate TCP-targeted DoS attack disrupts internet routing
-
Feb.
-
Y. Zhang, Z. M. Mao, and J. Wang, "Low-rate TCP-targeted DoS attack disrupts internet routing, " in Proc. 14th Netw. Distrib. Syst. Security Symp., Feb. 2007, pp. 1-15.
-
(2007)
Proc. 14th Netw. Distrib. Syst. Security Symp.
, pp. 1-15
-
-
Zhang, Y.1
Mao, Z.M.2
Wang, J.3
-
17
-
-
70349663836
-
On the exploitation of CDF based wireless scheduling
-
Apr.
-
U. Ben-Porat, A. Bremler-Barr, and H. Levy, "On the exploitation of CDF based wireless scheduling, " in Proc. IEEE Int. Conf. Comput. Commun., Apr. 2009, pp. 2821-2825.
-
(2009)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 2821-2825
-
-
Ben-Porat, U.1
Bremler-Barr, A.2
Levy, H.3
-
18
-
-
33744524845
-
Low-rate TCP-targeted denial of service attacks and counter strategies
-
Aug.
-
A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies, " IEEE/ACM Trans. Netw., vol. 14, no. 4, pp. 683-696, Aug. 2006.
-
(2006)
IEEE/ACM Trans. Netw.
, vol.14
, Issue.4
, pp. 683-696
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
19
-
-
25844493118
-
TCP vs. TCP: A systematic study of adverse impact of short-lived TCP flows on long lived TCP flows
-
Mar.
-
S. Ebrahimi-Taghizadeh, A. Helmy, and S. Gupta, "TCP vs. TCP: A systematic study of adverse impact of short-lived TCP flows on long lived TCP flows, " in Proc. IEEE Int. Conf. Comput. Commun., Mar. 2005, pp. 926-937.
-
(2005)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 926-937
-
-
Ebrahimi-Taghizadeh, S.1
Helmy, A.2
Gupta, S.3
-
20
-
-
34548297939
-
Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs
-
M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang, "Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs, " in Proc. IEEE Int. Conf. Comput. Commun., 2007, pp. 857-865.
-
(2007)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 857-865
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.4
-
21
-
-
77954302312
-
Detecting application denial-of-service attacks: A group-testing-based approach
-
Aug.
-
Y. Xuan, I. Shin, M. T. Thai, and T. Znati, "Detecting application denial-of-service attacks: A group-testing-based approach, " IEEE Tran. Parallel Distrib. Syst., vol. 21, no. 8, pp. 1203-1216, Aug. 2010.
-
(2010)
IEEE Tran. Parallel Distrib. Syst.
, vol.21
, Issue.8
, pp. 1203-1216
-
-
Xuan, Y.1
Shin, I.2
Thai, M.T.3
Znati, T.4
-
22
-
-
84864258356
-
Sophisticated denial of service attacks aimed at application layer
-
V. Durcekova, L. Schwartz, and N. Shahmehri, "Sophisticated denial of service attacks aimed at application layer, " in Proc. 9th Int. Conf. ELEKTRO, 2012, pp. 55-60.
-
(2012)
Proc. 9th Int. Conf. ELEKTRO
, pp. 55-60
-
-
Durcekova, V.1
Schwartz, L.2
Shahmehri, N.3
-
23
-
-
69749128415
-
LoRDAS: A low-rate DoS attack against application servers
-
G. Macia-Fernandez, E. Diaz-Verdejo, and P. Garcia-Teodoro, "LoRDAS: A low-rate DoS attack against application servers, " in Proc. 2nd Int. Conf. Critical Inf. Infrastruct. Security, 2008, vol. 5141, pp. 197-209.
-
(2008)
Proc. 2nd Int. Conf. Critical Inf. Infrastruct. Security
, vol.5141
, pp. 197-209
-
-
MacIa-Fernandez, G.1
Diaz-Verdejo, E.2
Garcia-Teodoro, P.3
-
24
-
-
69749124860
-
Mathematical model for low-rate DoS attacks against application server
-
Sep.
-
G. Macia-Fernandez, J. E. Diaz-Verdejo, and P. Garcia-Teodoro, "Mathematical model for low-rate DoS attacks against application server, " IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 519-529, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.3
, pp. 519-529
-
-
MacIa-Fernandez, G.1
Diaz-Verdejo, J.E.2
Garcia-Teodoro, P.3
-
25
-
-
84939860310
-
On a new class of pulsing denial-of-service attacks and the defense
-
Feb.
-
X. Luo and R. K. Chang, "On a new class of pulsing denial-of-service attacks and the defense, " in Proc. Netw. Distrib. Syst. Security Symp., Feb. 2005, pp. 61-79.
-
(2005)
Proc. Netw. Distrib. Syst. Security Symp.
, pp. 61-79
-
-
Luo, X.1
Chang, R.K.2
-
26
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
Sep.
-
Y. Chen and K. Hwang, "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis, " J. Parallel Distrib. Comput., vol. 66, no. 9, pp. 1137-1151, Sep. 2006.
-
(2006)
J. Parallel Distrib. Comput.
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
27
-
-
77955384577
-
Real-time detection of stealthy ddos attacks using timeseries decomposition
-
H. Liu. "Real-time detection of stealthy ddos attacks using timeseries decomposition, " in Proc. Int. Conf. Commun., 2010, pp. 1-6.
-
Proc. Int. Conf. Commun.
, vol.2010
, pp. 1-6
-
-
Liu, H.1
-
30
-
-
70350156792
-
A survey of attacks on web services
-
M. Jensen, N. Gruschka, and R. Herkenh, "A survey of attacks on web services, " Comput. Sci., vol. 24, no. 4, pp. 185-197, 2009.
-
(2009)
Comput. Sci.
, vol.24
, Issue.4
, pp. 185-197
-
-
Jensen, M.1
Gruschka, N.2
Herkenh, R.3
-
31
-
-
84863947150
-
Intrusion tolerance of stealth DoS attacks to web services
-
M. Ficco and M. Rak, "Intrusion tolerance of stealth DoS attacks to web services, " in Proc. Int. Conf. Inf. Security Privacy, 2012, vol. 376, pp. 579-584.
-
(2012)
Proc. Int. Conf. Inf. Security Privacy
, vol.376
, pp. 579-584
-
-
Ficco, M.1
Rak, M.2
-
32
-
-
81255200367
-
Intrusion tolerant approach for denial of service attacks to web services
-
Jun.
-
M. Ficco and M. Rak, "Intrusion tolerant approach for denial of service attacks to web services, " in Proc. IEEE Int. Conf. Data Compression, Commun. Process., Jun. 2011, pp. 285-292.
-
(2011)
Proc. IEEE Int. Conf. Data Compression, Commun. Process.
, pp. 285-292
-
-
Ficco, M.1
Rak, M.2
-
33
-
-
84924703974
-
-
TPC Benchmark W (TPC-W)
-
TPC Benchmark W (TPC-W). A transactional web benchmark. (2013) [Online]. Available: at http://www.tpc.org/tpcw/
-
(2013)
A Transactional Web Benchmark
-
-
-
34
-
-
26844482664
-
A time-series decomposed model of network traffic
-
C. Guang, G. Jian, and D. Wei, "A time-series decomposed model of network traffic, " in Proc. 1st Int. Conf. Adv. Natural Comput., 2005, pp. 338-345.
-
(2005)
Proc. 1st Int. Conf. Adv. Natural Comput.
, pp. 338-345
-
-
Guang, C.1
Jian, G.2
Wei, D.3
-
36
-
-
84875043225
-
Performance analysis of network I/O workloads in virtualized data centers
-
Jan.
-
Y. Mei, L. Liu, and X. Pu, "Performance analysis of network I/O workloads in virtualized data centers, " IEEE Trans. Services Comput., vol. 6, no. 1, pp. 48-63, Jan. 2013.
-
(2013)
IEEE Trans. Services Comput.
, vol.6
, Issue.1
, pp. 48-63
-
-
Mei, Y.1
Liu, L.2
Pu, X.3
-
38
-
-
84891779173
-
A self-optimizing workload management solution for cloud applications
-
H. Wu, A. N. Tantawi, and T. Yu, "A self-optimizing workload management solution for cloud applications, " in Proc. IEEE 20th Int. Conf. Web Serv., 2013, pp. 483-490.
-
(2013)
Proc. IEEE 20th Int. Conf. Web Serv.
, pp. 483-490
-
-
Wu, H.1
Tantawi, A.N.2
Yu, T.3
-
39
-
-
77952771893
-
Monitoring continuous state violation in datacenters: Exploring the time dimension
-
S. Meng, T. Wang, and L. Liu, "Monitoring continuous state violation in datacenters: Exploring the time dimension, " in Proc. IEEE 26th Int. Conf. Data Eng., 2010, pp. 968-979.
-
(2010)
Proc. IEEE 26th Int. Conf. Data Eng.
, pp. 968-979
-
-
Meng, S.1
Wang, T.2
Liu, L.3
-
40
-
-
84880300768
-
-
Jan.
-
Auto Scaling in the Amazon Cloud. (2012, Jan.) [Online]. Available: http://techblog.netflix.com/2012/01/auto-scalingin-amazoncloud. html
-
(2012)
Auto Scaling in the Amazon Cloud
-
-
-
41
-
-
84882403734
-
Security event correlation approach for cloud computing
-
M. Ficco, "Security event correlation approach for cloud computing, " Int. J. High Perform. Comput. Netw., vol. 7, no. 3, pp. 173-185, 2013.
-
(2013)
Int. J. High Perform. Comput. Netw.
, vol.7
, Issue.3
, pp. 173-185
-
-
Ficco, M.1
|