-
1
-
-
84855860365
-
Evaluating network-based DoS attacks under the energy consumption perspective: New security issues in the coming green ICT area
-
F. Palmieri, S. Ricciardi, and U. Fiore, "Evaluating network-based DoS attacks under the energy consumption perspective: New security issues in the coming green ICT area, " in Proc. IEEE Int. Conf. BWCCA, 2011, pp. 374-379.
-
(2011)
Proc IEEE Int. Conf. BWCCA
, pp. 374-379
-
-
Palmieri, F.1
Ricciardi, S.2
Fiore, U.3
-
2
-
-
84881425324
-
Green- Aware security: Towards a new research field
-
L. Caviglione, A. Merlo, and M. Migliardi, "Green- Aware security: Towards a new research field, " J. Inf. Assurance Security, vol. 7, no. 5, pp. 338-346, 2012.
-
(2012)
J. Inf. Assurance Security
, vol.7
, Issue.5
, pp. 338-346
-
-
Caviglione, L.1
Merlo, A.2
Migliardi, M.3
-
3
-
-
84888101121
-
Analyzing job completion reliability and job energy consumption for a general map reduce infrastructure
-
Jul
-
J. Lin, F. Leu, and Y. Chen, "Analyzing job completion reliability and job energy consumption for a general map reduce infrastructure, " J. High Speed Netw, vol. 19, no. 3, pp. 203-214, Jul. 2013.
-
(2013)
J. High Speed Netw
, vol.19
, Issue.3
, pp. 203-214
-
-
Lin, J.1
Leu, F.2
Chen, Y.3
-
4
-
-
84866785864
-
On energy security of server systems
-
Nov
-
Z. Wu, M. Xie, and H. Wang, "On energy security of server systems, " IEEE Trans. Dependable Secure Comput, vol. 9, no. 6, pp. 865-876, Nov. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput
, vol.9
, Issue.6
, pp. 865-876
-
-
Wu, Z.1
Xie, M.2
Wang, H.3
-
5
-
-
85028295216
-
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures
-
Palmieri F.,Ricciardi S.,Fiore U.,Castiglione A.,Ficco M.Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.Journal of Supercomputing 71(5),2015.pp:1620-1641
-
(2015)
Journal of Supercomputing
, vol.71
, Issue.5
, pp. 1620-1641
-
-
Palmieri, F.1
Ricciardi, S.2
Fiore, U.3
Ficco, M.4
Castiglione, A.5
-
6
-
-
84888842651
-
Interconnecting federated clouds by using publish-subscribe service
-
Dec
-
C. Esposito, M. Ficco, F. Palmieri, and A. Castiglione, "Interconnecting federated clouds by using publish-subscribe service, " Cluster Comput, vol. 16, no. 4, pp. 887-903, Dec. 2013.
-
(2013)
Cluster Comput
, vol.16
, Issue.4
, pp. 887-903
-
-
Esposito, C.1
Ficco, M.2
Palmieri, F.3
Castiglione, A.4
-
7
-
-
80053144966
-
Exploiting cloud utility models for profit and ruin
-
J. Idziorek, "Exploiting cloud utility models for profit and ruin, " in Proc. IEEE CLOUD, 2011, pp. 33-40.
-
(2011)
Proc IEEE CLOUD
, pp. 33-40
-
-
Idziorek, J.1
-
8
-
-
84875706647
-
The insecurity of cloud utility models
-
Mar./Apr
-
J. Idziorek, M. F. Tannian, and D. Jacobson, "The insecurity of cloud utility models, " IEEE IT Prof, vol. 15, no. 2, pp. 22-27, Mar./Apr. 2013.
-
(2013)
IEEE IT Prof
, vol.15
, Issue.2
, pp. 22-27
-
-
Idziorek, J.1
Tannian, M.F.2
Jacobson, D.3
-
9
-
-
84882403734
-
Security event correlation approach for cloud computing
-
Sep
-
M. Ficco, "Security event correlation approach for cloud computing, " J. High Perform. Comput. Netw, vol. 7, no. 3, pp. 173-185, Sep. 2013.
-
(2013)
J. High Perform. Comput. Netw
, vol.7
, Issue.3
, pp. 173-185
-
-
Ficco, M.1
-
10
-
-
84884992379
-
Defending against next generation through network/endpoint collaboration and interaction
-
S. Antonatos, M. Locasto, S. Sidiroglou, A. D. Keromytis, and E. Markatos, "Defending against next generation through network/endpoint collaboration and interaction, " in Proc. 3rd Eur. Conf. Comput. Netw. Defense, 2009, pp. 131-141.
-
(2009)
Proc. 3rd Eur. Conf. Comput. Netw. Defense
, pp. 131-141
-
-
Antonatos, S.1
Locasto, M.2
Sidiroglou, S.3
Keromytis, A.D.4
Markatos, E.5
-
11
-
-
33744524845
-
Low-rate TCP-Targeted denial of service attacks and counter strategies
-
Aug
-
A. Kuzmanovic, and E. Knightly, "Low-rate TCP-Targeted denial of service attacks and counter strategies, " Proc. IEEE/ACM TON, vol. 14, no. 4, pp. 683-696, Aug. 2006.
-
(2006)
Proc IEEE/ ACM TON
, vol.14
, Issue.4
, pp. 683-696
-
-
Kuzmanovic, A.1
Knightly, E.2
-
12
-
-
1242287727
-
Low-rate TCP-Targeted denial of service attacks: The shrew versus the mice and elephants
-
ACM
-
A. Kuzmanovic, and E. Knightly, "Low-rate TCP-Targeted denial of service attacks: The shrew versus the mice and elephants, " in Proc. Conf. Appl., Technol., ACM, 2003, pp. 75-86.
-
(2003)
Proc. Conf. Appl., Technol
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.2
-
13
-
-
84864258356
-
Sophisticated denial of service attacks aimed at application layer
-
V. Durcekova, L. Schwartz, and N. Shahmehri, "Sophisticated denial of service attacks aimed at application layer, " in Proc. 9th Int. Conf. ELEKTRO, 2012, pp. 55-60.
-
(2012)
Proc. 9th Int. Conf. ELEKTRO
, pp. 55-60
-
-
Durcekova, V.1
Schwartz, L.2
Shahmehri, N.3
-
14
-
-
69749128415
-
LoRDAS: A low-rate DoS attack against application servers
-
G. Macia-Fernandez, E. Diaz-Verdejo, and P. Garcia-Teodoro, "LoRDAS: A low-rate DoS attack against application servers, " in Proc. 2th Int. Conf. Critical Inf. Infrastructures Security, LNCS, 2008, vol. 5141, pp. 197-209.
-
(2008)
Proc. 2th Int. Conf. Critical Inf. Infrastructures Security, LNCS
, vol.5141
, pp. 197-209
-
-
Macia-Fernandez, G.1
Diaz-Verdejo, E.2
Garcia-Teodoro, P.3
-
15
-
-
84939860310
-
On a new class of pulsing denial-of-service attacks and the defense
-
X. Luo, and R. K. Chang, "On a new class of pulsing denial-of-service attacks and the defense, " in Proc. Netw. Distrib. Syst. Security Symp., 2005, pp. 61-79.
-
(2005)
Proc. Netw. Distrib. Syst. Security Symp
, pp. 61-79
-
-
Luo, X.1
Chang, R.K.2
-
16
-
-
69749124860
-
Mathematical model for low-rate DoS attacks against application server
-
Sep
-
G. Macia-Fernandez, J. E. Diaz-Verdejo, and P. Garcia-Teodoro, "Mathematical model for low-rate DoS attacks against application server, " IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 519-529, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.3
, pp. 519-529
-
-
Macia-Fernandez, G.1
Diaz-Verdejo, J.E.2
Garcia-Teodoro, P.3
-
17
-
-
77957662754
-
A queuing analysis for low-rate DoS attacks against application servers
-
X. Xu, X. Guo, and S. Zhu, "A queuing analysis for low-rate DoS attacks against application servers, " in Proc. IEEE Conf. Wireless Commun., Netw. Inf. Security, 2010, pp. 500-504.
-
(2010)
Proc IEEE Conf. Wireless Commun., Netw. Inf. Security
, pp. 500-504
-
-
Xu, X.1
Guo, X.2
Zhu, S.3
-
18
-
-
33845714972
-
Evaluation of a low-rate dos attack against iterative servers
-
Mar
-
G. Macia-Fernandez, J. E. Daz-Verdejo, and P. Garca-Teodoro, "Evaluation of a low-rate dos attack against iterative servers, " Comput. Netw, vol. 51, no. 4, pp. 1013-1030, Mar. 2007.
-
(2007)
Comput. Netw
, vol.51
, Issue.4
, pp. 1013-1030
-
-
Macia-Fernandez, G.1
Daz-Verdejo, J.E.2
Garca-Teodoro, P.3
-
19
-
-
55649105431
-
Evaluation of a low-rate DoS attack against application servers
-
Dec
-
G. Macia-Fernandez, J. E. Daz-Verdejo, and P. Garcia-Teodoro, "Evaluation of a low-rate DoS attack against application servers, " Comput. Security, vol. 27, no. 7/8, pp. 335-354, Dec. 2008.
-
(2008)
Comput. Security
, vol.27
, Issue.7-8
, pp. 335-354
-
-
Macia-Fernandez, G.1
Daz-Verdejo, J.E.2
Garcia-Teodoro, P.3
-
20
-
-
84938683561
-
Adaptive stealth energy-related DoS attacks against cloud data centers
-
F. Palmieri, M. Ficco, and A. Castiglione, "Adaptive stealth energy-related DoS attacks against cloud data centers, " in Proc. 8th Int. Conf. IMIS, 2014, pp. 265-272.
-
(2014)
Proc. 8th Int. Conf. IMIS
, pp. 265-272
-
-
Palmieri, F.1
Ficco, M.2
Castiglione, A.3
-
21
-
-
79956153885
-
Cloud security defense to protect cloud computing against HTTP-DOS and XML-DoS attacks
-
Jul
-
A. Chonka, Y. Xiang, and A. Bonti, "Cloud security defense to protect cloud computing against HTTP-DOS and XML-DoS attacks, " J. Netw. Comput. Appl, vol. 34, no. 4, pp. 1097-1107, Jul. 2011.
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.4
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Bonti, A.3
-
22
-
-
85027441571
-
-
OpenNebula Archives [Online]. Available
-
OpenNebula Archives, "Oneflow server configuration 4.4." [Online]. Available: http://archives.opennebula.org/documentation:rel4.4:appflow-configure
-
Oneflow Server Configuration 44
-
-
-
23
-
-
77955384577
-
Real-Time detection of stealthy DDoS attacks using time-series decomposition
-
H. Liu, and M. S. Kim, "Real-Time detection of stealthy DDoS attacks using time-series decomposition, " in Proc. IEEE ICC, 2010, pp. 1-6.
-
(2010)
Proc IEEE ICC
, pp. 1-6
-
-
Liu, H.1
Kim, M.S.2
-
24
-
-
77956393826
-
Network anomaly detection through nonlinear analysis
-
Oct
-
F. Palmieri, and U. Fiore, "Network anomaly detection through nonlinear analysis, " Comput. Security, vol. 29, no. 7, pp. 737-755, Oct. 2010.
-
(2010)
Comput. Security
, vol.29
, Issue.7
, pp. 737-755
-
-
Palmieri, F.1
Fiore, U.2
-
25
-
-
84896297829
-
A distributed approach to network anomaly detection based on independent component analysis
-
Apr
-
F. Palmieri, U. Fiore, and A. Castiglione, "A distributed approach to network anomaly detection based on independent component analysis, " Concurrency Comput.: Practice Exp, vol. 25, no. 5, pp. 1113-1129, Apr. 2014.
-
(2014)
Concurrency Comput.: Practice Exp
, vol.25
, Issue.5
, pp. 1113-1129
-
-
Palmieri, F.1
Fiore, U.2
Castiglione, A.3
-
26
-
-
77956877779
-
Defense techniques for low-rate DoS attacks against application servers
-
Oct
-
G. Macia-Fernandez, R. A. Rodriguez-Gomez, and J. E. Diaz-Verdejo, "Defense techniques for low-rate DoS attacks against application servers, " Comput. Netw, vol. 54, no. 15, pp. 2711-2727, Oct. 2010.
-
(2010)
Comput. Netw
, vol.54
, Issue.15
, pp. 2711-2727
-
-
Macia-Fernandez, G.1
Rodriguez-Gomez, R.A.2
Diaz-Verdejo, J.E.3
|