SOAiCE: Simulation of Attacks in Cloud Computing Environment
暂无分享,去创建一个
[1] Anurag Jain,et al. Analysis of brute force attack using TG — Dataset , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).
[2] P. D. Sheba Kezia Malarchelvi,et al. A survey of jamming attack prevention techniques in wireless networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[3] Keshav Jindal,et al. Analyzing Spoofing Attacks in Wireless Networks , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.
[4] Dijana Oreski,et al. Analysis of phishing attacks against students , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[5] S. H. Krishnaveni,et al. A Study of Data Storage Security Issues in Cloud Computing , 2015 .
[6] Naresh Vurukonda,et al. A Study on Data Storage Security Issues in Cloud Computing , 2016 .
[7] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[8] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[9] Rahul Johari,et al. CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool , 2014, SSCC.
[10] Nazim Agoulmine,et al. State of the art and challenges of security SLA for cloud computing , 2017, Comput. Electr. Eng..
[11] Jun Hu,et al. Research of SQL injection attack and prevention technology , 2015, 2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF).
[12] Rahul Johari,et al. EAST: Exploitation of Attacks and System Threats in Network , 2015 .
[13] Paul Tavolato,et al. Detection of Man-in-the-Middle Attacks on Industrial Control Networks , 2016, 2016 International Conference on Software Security and Assurance (ICSSA).
[14] Jacob Jose,et al. Securing passwords from dictionary attack with character-tree , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[15] K. Selvamani,et al. Data Security Challenges and Its Solutions in Cloud Computing , 2015 .
[16] Abeer Alsadoon,et al. Distributed Denial of Service attack on cloud: Detection and prevention , 2015, 2015 International Conference and Workshop on Computing and Communication (IEMCON).
[17] G. Murali,et al. Security Issues in Service Model of Cloud Computing Environment , 2016 .
[18] Manoj Singh Gaur,et al. DDoS attacks in cloud computing: Issues, taxonomy, and future directions , 2017, Comput. Commun..
[19] Guiran Chang,et al. Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .