Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
In cloud computing, data and applications are maintained on remote servers and accessed via the Internet. Virtualised resources such as dynamic servers are operated through the Internet, which increases the economic benefits accrued to customers from software. Cloud computing reduces customer concer...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Published: |
The International Association for Information, Culture, Human and Industry Technology (AICIT)
2015
|
| Subjects: | |
| Online Access: | https://www.researchgate.net/publication/306259719_Security_Scheme_for_Protecting_Cloud_Computing_Services_Against_Bursty_DDoS_Attacks https://www.researchgate.net/publication/306259719_Security_Scheme_for_Protecting_Cloud_Computing_Services_Against_Bursty_DDoS_Attacks http://umpir.ump.edu.my/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Internet
https://www.researchgate.net/publication/306259719_Security_Scheme_for_Protecting_Cloud_Computing_Services_Against_Bursty_DDoS_Attackshttps://www.researchgate.net/publication/306259719_Security_Scheme_for_Protecting_Cloud_Computing_Services_Against_Bursty_DDoS_Attacks
http://umpir.ump.edu.my/7335/1/fskkp-2014-mazlina-Security_Scheme_for_Protecting.pdf