1 |
Shukur, H., et al., Cloud computing virtualization of resources allocation for distributed systems. Journal of Applied Science and Technology Trends, 2020. 1(3): p. 98-105.
DOI
|
2 |
Kumar, R. and S. Charu, An importance of using virtualization technology in cloud computing. Global Journal of Computers & Technology, 2015. 1(2).
|
3 |
Erhan, Derya (2020), "Bogazici University Distributed Denial of Service (BOUN DDoS) Dataset", Mendeley Data, V1, doi: 10.17632/mfnn9bh42m.1
DOI
|
4 |
Jiao, J., et al. Detecting TCP-based DDoS attacks in Baidu cloud computing data centers. in 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS). 2017. IEEE.
|
5 |
Darwish, M., A. Ouda, and L.F. Capretz. Cloud-based DDoS attacks and defenses. in International Conference on Information Society (i-Society 2013). 2013. IEEE.
|
6 |
Osanaiye, O.A., DDoS defence for service availability in cloud computing. 2016.
|
7 |
Gupta, B., R. Joshi, and M. Misra, Prediction of a number of zombies in a DDoS attack using a polynomial regression model. Journal of advances in information technology, 2011. 2(1): p. 57-62.
|
8 |
Balarezo, J.F., et al., A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Engineering Science and Technology, an International Journal, 2021.
|
9 |
Dixit, S., Cloud Computing Security aspects: Threats, Countermeasures and Intrusion Detection using Support Vector Machine. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021. 12(10): p. 2271-2277.
|
10 |
Carlin, A., M. Hammoudeh, and O. Aldabbas, Defence for distributed denial of service attacks in cloud computing. Procedia computer science, 2015. 73: p. 490-497.
|
11 |
Ali, M.B., T. Wood-Harper, and R. Ramlogan, A Framework Strategy to Overcome Trust Issues on Cloud Computing Adoption in Higher Education, in Modern Principles, Practices, and Algorithms for Cloud Security. 2020, IGI Global. p. 162-183.
|
12 |
Alouffi, B., et al., A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access, 2021. 9: p. 57792-57807.
DOI
|
13 |
Siddiqui, S.T., et al., Cloud-based e-learning: using cloud computing platform for effective e-learning, in Smart Innovations in Communication and Computational Sciences. 2019, Springer. p. 335-346.
|
14 |
Miyachi, C., What is "Cloud"? It is time to update the NIST definition? IEEE Cloud computing, 2018. 5(03): p. 6-11.
DOI
|
15 |
Alam, T., Cloud Computing and its role in Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 2021. 1: p. 108-115.
|
16 |
Attaran, M. and J. Woods, Cloud computing technology: improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 2019. 31(6): p. 495-519.
DOI
|
17 |
Alhenaki, L., et al. A survey on the security of cloud computing. in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). 2019. IEEE.
|
18 |
Amjad, A., et al., Detection and mitigation of DDoS attack in cloud computing using a machine learning algorithm. EAI Endorsed Transactions on Scalable Information Systems, 2019. 6(26).
|
19 |
Harshita, H., Detection, and prevention of ICMP flood DDOS attack. International Journal of New Technology and Research, 2017. 3(3): p. 263333.
|
20 |
Schuba, C.L., et al. Analysis of a denial of service attack on TCP. in Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097). 1997. IEEE.
|
21 |
Kieu, M.V. and T.T. Nguyen. A way to estimate TCP throughput under low-rate DDoS attacks: one TCP flow. in 2020 RIVF International Conference on Computing and Communication Technologies (RIVF). 2020. IEEE.
|
22 |
Bedi, H.S., S. Roy, and S. Shiva. Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. in 2011 IEEE symposium on computational intelligence in cyber security (CICS). 2011. IEEE.
|
23 |
Sahu, S.K. and R. Khare, DDOS Attacks & Mitigation Techniques in Cloud Computing Environments. Gedrag Organ. Rev, 2020. 33(2): p. 2426-2435.
|
24 |
Malik, M.I., S.H. Wani, and A. Rashid, CLOUD COMPUTING-TECHNOLOGIES. International Journal of Advanced Research in Computer Science, 2018. 9(2).
|
25 |
Atiewi, S., A. Abuhussein, and M.A. Saleh. Impact of Virtualization on Cloud Computing Energy Consumption: Empirical Study. in Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control. 2018.
|
26 |
Wani, A.R., et al. Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. in 2019 Amity International conference on artificial intelligence (AICAI). 2019. IEEE.
|