Choudhary et al., 2020
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Modi et al. | A survey of intrusion detection techniques in cloud | |
| Kene et al. | A review on intrusion detection techniques for cloud computing and security challenges | |
| JP4911018B2 (en) | Filtering apparatus, filtering method, and program causing computer to execute the method | |
| Durcekova et al. | Sophisticated denial of service attacks aimed at application layer | |
| US7039950B2 (en) | System and method for network quality of service protection on security breach detection | |
| Chiba et al. | A survey of intrusion detection systems for cloud computing environment | |
| JP2002342279A (en) | Filtering device, filtering method, and program for causing computer to execute this method | |
| Shah et al. | A method to secure IoT devices against botnet attacks | |
| Somwanshi et al. | Implementation of honeypots for server security | |
| Reddy et al. | Analysis and detection of dos attacks in cloud computing by using qse algorithm | |
| Venkatesan et al. | Analysis of accounting models for the detection of duplicate requests in web services | |
| Choudhary et al. | Detection and Isolation of Zombie Attack under Cloud Computing | |
| Pahal et al. | Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation | |
| Durairaj et al. | A study on securing cloud environment from DDoS attack to preserve data availability | |
| Rosy et al. | Intrusion Detection System in Cloud Computing | |
| Prasad et al. | An efficient flash crowd attack detection to internet threat monitors (itm) using honeypots | |
| Gomathi et al. | Identification of Network Intrusion in Network Security by Enabling Antidote Selection | |
| CN119766556B (en) | A distributed data security protection system based on Internet of Things nodes | |
| Rayjada et al. | Analytical Research of Data Center Security Implementations and Cyber Attacks | |
| Faisal et al. | Security architecture of cloud network against cyber threats. | |
| MA et al. | Attacks and countermeasures in software system security | |
| Kotzanikolaou et al. | Computer network security: Basic background and current issues | |
| Garg et al. | Security of Modern Networks and Its Challenges | |
| Sharma et al. | Analysis of IDS Tools & Techniques | |
| Devi et al. | NEW MULTI PHASE DISTRIBUTION NETWORK INTRUSION DETECTION |