메뉴 건너뛰기




Volumn 2015-March, Issue , 2015, Pages 5331-5340

DDoS attacks in service clouds

Author keywords

DDoS attacks; Service chain; Service cloud; Web services

Indexed keywords

NETWORK SECURITY; WEB SERVICES; WEBSITES;

EID: 84944255603     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2015.627     Document Type: Conference Paper
Times cited : (27)

References (32)
  • 3
    • 84894430070 scopus 로고    scopus 로고
    • A scalable architecture for automatic service composition
    • Paik, I., Chen, W., and Huhns, M. N., "A Scalable Architecture for Automatic Service Composition", IEEE Transactions on Services Computing, 7(1), 2014, pp. 82-95.
    • (2014) IEEE Transactions on Services Computing , vol.7 , Issue.1 , pp. 82-95
    • Paik, I.1    Chen, W.2    Huhns, M.N.3
  • 7
  • 9
  • 17
    • 80053139318 scopus 로고    scopus 로고
    • Defending web services against denial of service attacks using client puzzles
    • Suriadi, S., Stebila, D., Clark, A., and Liu, H., "Defending Web Services against Denial of Service Attacks Using Client Puzzles", IEEE Int'l Conf. on Web Services, 2011, pp. 25-32.
    • (2011) IEEE Int'l Conf. on Web Services , pp. 25-32
    • Suriadi, S.1    Stebila, D.2    Clark, A.3    Liu, H.4
  • 19
    • 49049101669 scopus 로고    scopus 로고
    • An adaptive intrusion detection and prevention (id/IP) framework for web services
    • Yee, C., Shin, W., and Rao, G., "An Adaptive Intrusion Detection and Prevention (Id/Ip) Framework for Web Services", Int'l Conf. on Convergence Information Technology, 2007, pp. 528-534.
    • (2007) Int'l Conf. on Convergence Information Technology , pp. 528-534
    • Yee, C.1    Shin, W.2    Rao, G.3
  • 23
    • 84944260932 scopus 로고    scopus 로고
    • accessed 01/21/2014
    • https://downloads. cloudsecurityalliance. org/ initiatives/ top-threats/The-Notorious-Nine-Cloud-Computing -Top-Threats-in-2013. pdf, accessed 01/21/2014, 2014.
    • (2014)
  • 26
    • 84862973274 scopus 로고    scopus 로고
    • Study of multistage anomaly detection for secured cloud computing resources in future internet
    • Cha, B., and Kim, J., "Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet", IEEE 9th Int'l Conf. on Dependable, Autonomic and Secure Computing, 2011, pp. 1046-1050.
    • (2011) IEEE 9th Int'l Conf. on Dependable, Autonomic and Secure Computing , pp. 1046-1050
    • Cha, B.1    Kim, J.2
  • 31
    • 0009874629 scopus 로고    scopus 로고
    • On the stop-loss and total variation distances between random sums
    • Denuit, M., And Bellegem,S. V., "On the Stop-Loss and Total Variation Distances between Random Sums", Statistics and Probability Letters, 53(2), 2001, pp. 153-165.
    • (2001) Statistics and Probability Letters , vol.53 , Issue.2 , pp. 153-165
    • Denuit, M.1    Bellegem, S.V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.