Related references
Note: Only part of the references are listed.Building an open source cloud environment with auto-scaling resources for executing bioinformatics and biomedical workflows
Michael T. Krieger et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Cloud security issues and challenges: A survey
Ashish Singh et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid
Kun Wang et al.
IEEE TRANSACTIONS ON SMART GRID (2017)
MERRA Analytic Services: Meeting the Big Data challenges of climate science through cloud-enabled Climate Analytics-as-a-Service
John L. Schnase et al.
COMPUTERS ENVIRONMENT AND URBAN SYSTEMS (2017)
MLP-GA based algorithm to detect application layer DDoS attack
Khundrakpam Johnson Singh et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2017)
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
Gaurav Somani et al.
COMPUTER COMMUNICATIONS (2017)
DDoS in the IoT: Mirai and Other Botnets
Constantinos Kolias et al.
COMPUTER (2017)
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges
Karanpreet Singh et al.
COMPUTERS & SECURITY (2017)
Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks
Zubair A. Baig et al.
COMPUTER NETWORKS (2016)
DDoS attacks in cloud computing: Collateral damage to non-targets
Gaurav Somani et al.
COMPUTER NETWORKS (2016)
Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks
Khundrakpam Johnson Singh et al.
ENTROPY (2016)
Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges
Qiao Yan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
Joseph K. Liu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Auto-Scaling of Geo-Based Image Processing in an OpenStack Cloud Computing Environment
Sanggoo Kang et al.
REMOTE SENSING (2016)
An Entropy-Based Network Anomaly Detection Method
Przemyslaw Berezinski et al.
ENTROPY (2015)
Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
Guang Yao et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
Monowar H. Bhuyan et al.
PATTERN RECOGNITION LETTERS (2015)
Uniform DoS traceback
Mohammed N. Alenezi et al.
COMPUTERS & SECURITY (2014)
Detection and defense of application-layer DDoS attacks in backbone web traffic
Wei Zhou et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)
An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks
EunHee Jeong et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)
Can We Beat DDoS Attacks in Clouds?
Shui Yu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
A review of novelty detection
Marco A. F. Pimentel et al.
SIGNAL PROCESSING (2014)
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
Wei Wei et al.
IEEE COMMUNICATIONS LETTERS (2013)
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
Saman Taghavi Zargar et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Anomaly detection
Varun Chandola et al.
ACM COMPUTING SURVEYS (2009)
Model identification of ARIMA family using genetic algorithms
CS Ong et al.
APPLIED MATHEMATICS AND COMPUTATION (2005)
Prediction intervals for exponential smoothing using two new classes of state space models
RJ Hyndman et al.
JOURNAL OF FORECASTING (2005)
Modeling Internet backbone traffic at the flow level
C Barakat et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2003)