-
1
-
-
85018443975
-
DDoS attacks in cloud computing: issues, taxonomy, and future directions
-
Somani, G., et al. DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput. Commun., 2017.
-
(2017)
Comput. Commun.
-
-
Somani, G.1
-
2
-
-
84987852363
-
A survey on cloud computing security: Issues, threats, and solutions
-
Singh, S., Jeong, Y.S., Park, J.H., A survey on cloud computing security: Issues, threats, and solutions. J. Netw. Comput. Appl. 75 (2016), 200–222.
-
(2016)
J. Netw. Comput. Appl.
, vol.75
, pp. 200-222
-
-
Singh, S.1
Jeong, Y.S.2
Park, J.H.3
-
3
-
-
84992297313
-
On the interplay of internet of things and cloud computing: a systematic mapping study
-
Cavalcante, E., et al. On the interplay of internet of things and cloud computing: a systematic mapping study. Comput. Commun. 89 (2016), 17–33.
-
(2016)
Comput. Commun.
, vol.89
, pp. 17-33
-
-
Cavalcante, E.1
-
4
-
-
84925840602
-
A survey on software-defined networking
-
Xia, W., et al. A survey on software-defined networking. IEEE Commun. Surv. Tutorials 17:1 (2015), 27–51.
-
(2015)
IEEE Commun. Surv. Tutorials
, vol.17
, Issue.1
, pp. 27-51
-
-
Xia, W.1
-
5
-
-
84880545424
-
Are we ready for SDN? Implementation challenges for software-defined networks
-
Sezer, S., Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Commun. Mag. 51:7 (2013), 36–43.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.7
, pp. 36-43
-
-
Sezer, S.1
-
6
-
-
84885206048
-
SDN-based cloud computing networking
-
Azodolmolky, S., Wieder, P., Yahyapour, R., SDN-based cloud computing networking. Proc. IEEE ICTON, 2013, 1–4.
-
(2013)
Proc. IEEE ICTON
, pp. 1-4
-
-
Azodolmolky, S.1
Wieder, P.2
Yahyapour, R.3
-
7
-
-
84877272118
-
Security and privacy in cloud computing
-
Xiao, Z., Xiao, Y., Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials. 5:2 (2013), 843–859.
-
(2013)
IEEE Commun. Surv. Tutorials.
, vol.5
, Issue.2
, pp. 843-859
-
-
Xiao, Z.1
Xiao, Y.2
-
8
-
-
85012207035
-
DDoS attack detection and mitigation using sdn: methods, practices, and solutions
-
Bawany, N.Z., Shamsi, J.A., Salah, K., DDoS attack detection and mitigation using sdn: methods, practices, and solutions. Arab. J. Sci. Eng. 42:2 (2017), 425–441.
-
(2017)
Arab. J. Sci. Eng.
, vol.42
, Issue.2
, pp. 425-441
-
-
Bawany, N.Z.1
Shamsi, J.A.2
Salah, K.3
-
9
-
-
85044005652
-
-
accessed online 04 Sep. accessed online 04 Sep.
-
Arbor Networks Inc. accessed online 04 Sep. http://www.arbornetworks.com, 2017 accessed online 04 Sep.
-
(2017)
-
-
-
10
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57:10 (2013), 2266–2279.
-
(2013)
Comput. Netw.
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
11
-
-
85013625591
-
Mitigating threats and security metrics in cloud computing
-
Kar, J., Mishra, M.R., Mitigating threats and security metrics in cloud computing. J. Inf. Process. Syst. 12:2 (2016), 1–8.
-
(2016)
J. Inf. Process. Syst.
, vol.12
, Issue.2
, pp. 1-8
-
-
Kar, J.1
Mishra, M.R.2
-
12
-
-
84861072527
-
Data security and privacy protection issues in cloud computing
-
Chen, D., Zhao, H., Data security and privacy protection issues in cloud computing. Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on IEEE, 1, 2012, 647–651.
-
(2012)
Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on IEEE
, vol.1
, pp. 647-651
-
-
Chen, D.1
Zhao, H.2
-
13
-
-
84947427796
-
An intelligent green service in internet of things
-
Lee, E.J., Kim, C.H., Jung, I.Y., An intelligent green service in internet of things. JoC 5:3 (2014), 4–8.
-
(2014)
JoC
, vol.5
, Issue.3
, pp. 4-8
-
-
Lee, E.J.1
Kim, C.H.2
Jung, I.Y.3
-
14
-
-
84961911849
-
Protection scheme for IoT devices using introspection
-
Kang, C., Abbas, F., Oh, H., Protection scheme for IoT devices using introspection. Network of the Future (NOF), 2015 6th International Conference on the IEEE, 2015, 1–5.
-
(2015)
Network of the Future (NOF), 2015 6th International Conference on the IEEE
, pp. 1-5
-
-
Kang, C.1
Abbas, F.2
Oh, H.3
-
15
-
-
84873897891
-
Improving network management with software defined networking
-
Kim, H., Feamster, N., Improving network management with software defined networking. IEEE Commun. Mag. 51:2 (2013), 114–119.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.2
, pp. 114-119
-
-
Kim, H.1
Feamster, N.2
-
16
-
-
84994495822
-
Device-to-device communication for mobile multimedia in emerging 5G networks
-
Liu, J., et al. Device-to-device communication for mobile multimedia in emerging 5G networks. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 12 (2016), 1–20.
-
(2016)
ACM Trans. Multimedia Comput. Commun. Appl. (TOMM)
, vol.12
, pp. 1-20
-
-
Liu, J.1
-
17
-
-
84994874514
-
A review of DOS attacks in cloud computing
-
Vidhya, V., A review of DOS attacks in cloud computing. IOSR J. Comput. Eng. (IOSRJCE) 16:5 (2014), 32–35.
-
(2014)
IOSR J. Comput. Eng. (IOSRJCE)
, vol.16
, Issue.5
, pp. 32-35
-
-
Vidhya, V.1
-
18
-
-
85044008434
-
-
accessed online 04 Sep. 2017
-
Q1 2015 DDoS Attacks Spike, Targeting Cloud, Tara Seals. http://www.infosecurity-magazine.com/news/q1-2015-ddos-attacks-spike/, 2015 accessed online 04 Sep. 2017.
-
(2015)
-
-
-
19
-
-
84935033655
-
Knowledge-based adaptable scheduler for SaaS providers in cloud computing
-
Motavaselalhagh, F., et al. Knowledge-based adaptable scheduler for SaaS providers in cloud computing. Hum. Centric Comput. Inf. Sci. 5:1 (2015), 16–34.
-
(2015)
Hum. Centric Comput. Inf. Sci.
, vol.5
, Issue.1
, pp. 16-34
-
-
Motavaselalhagh, F.1
-
20
-
-
85043992745
-
-
accessed online 04 Sep. accessed online 04 Sep.
-
accessed online 04 Sep. http://wikisites.cityu.edu.hk/sites/netcomp/articles/Pages/HardeningStepstoSecureCloudComputingEnvironment.aspx, 2017 accessed online 04 Sep.
-
(2017)
-
-
-
22
-
-
84990987622
-
FS-OpenSecurity: a taxonomic modeling of security threats in SDN for future sustainable computing
-
Sung, Y., et al. FS-OpenSecurity: a taxonomic modeling of security threats in SDN for future sustainable computing. Sustainability 8:9 (2016), 919–945.
-
(2016)
Sustainability
, vol.8
, Issue.9
, pp. 919-945
-
-
Sung, Y.1
-
23
-
-
84925396031
-
DDoS attack protection in the era of cloud computing and software-defined networking
-
Wang, B., DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81 (2015), 308–319.
-
(2015)
Comput. Netw.
, vol.81
, pp. 308-319
-
-
Wang, B.1
-
24
-
-
84876943063
-
Internet of Things (IoT): a vision, architectural elements, and future directions
-
Gubbi, J., et al. Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29:7 (2013), 1645–1660.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
-
26
-
-
84865538933
-
A network in a laptop: rapid prototyping for software-defined networks
-
ACM
-
Lantz, B., Heller, B., McKeown, N., A network in a laptop: rapid prototyping for software-defined networks. Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, 2010, ACM, 1–6.
-
(2010)
Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
, pp. 1-6
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
27
-
-
84961926975
-
SDSA: a framework of a software-defined security architecture
-
Yanbing, L., et al. SDSA: a framework of a software-defined security architecture. China Commun. 13 (2016), 178–188.
-
(2016)
China Commun.
, vol.13
, pp. 178-188
-
-
Yanbing, L.1
-
30
-
-
84947710564
-
SDN based architecture for IoT and improvement of the security
-
Flauzac, O., et al. SDN based architecture for IoT and improvement of the security. Advanced Information Networking and Applications Workshops (WAINA), 2015 IEEE 29th International Conference on, IEEE, 2015, 688–693.
-
(2015)
Advanced Information Networking and Applications Workshops (WAINA), 2015 IEEE 29th International Conference on, IEEE
, pp. 688-693
-
-
Flauzac, O.1
-
31
-
-
85043697901
-
Brew: a security policy analysis framework for distributed SDN-based cloud environments
-
Pisharody, S., et al. Brew: a security policy analysis framework for distributed SDN-based cloud environments. IEEE Trans. Dependable Secure Comput., 2017.
-
(2017)
IEEE Trans. Dependable Secure Comput.
-
-
Pisharody, S.1
-
32
-
-
85043998270
-
-
accessed online 04 Sep. accessed online 04 Sep.
-
UNB ISCX Datasets. accessed online 04 Sep. http://www.unb.ca/cic/research/datasets/index.html, 2017 accessed online 04 Sep.
-
(2017)
-
-
-
33
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOX/OpenFlow
-
Braga, R., Mota, E., Passito, A., Lightweight DDoS flooding attack detection using NOX/OpenFlow. LCN ’10 Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks, IEEE, 2010, 408–415.
-
(2010)
LCN ’10 Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks, IEEE
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
|