Computer Science ›› 2014, Vol. 41 ›› Issue (4): 120-125.
Previous Articles Next Articles
NIE Ting-ting and GUO Yu-cui
[1] 陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348 [2] Alok T,Abhinav M.Cloud Computing Security Considerations[C]∥IEEE ISCPCC.Xian,China,2011:1-5 [3] AlZain M A,Pardede E,Soh B,et al.Cloud Computing Security:From Single to Multi-Clouds[C]∥HICSS.Hawaii,USA,2012:5490-5499 [4] AlZain M A,Soh B,Pardede E.MCDB:Using Multi-Clouds to Ensure Security in Cloud Computing[C]∥DASC. Sydney,Australia,2011:784-791 [5] Trostle J.Protecting Against Distributed Denial of service at-tacks Using Distributed Filtering[C]∥Securecomm and Workshops. Baltimore,USA,2006:1-11 [6] Bhaskaran M,Natrarajan A M,Sivanandam S N.Tracebacking the Spoofed IP Packets in Multi ISP Domains with Secured Communication[C]∥ICSCN.Chennai,India,2007:579-584 [7] Joshi B,Vijayan A S,Joshi B K.Securing Cloud Computing Environment Against DDoS Attacks[C]∥ ICCCI.Coimbatore,India,2012:1-5 [8] 陈亚睿,田立勤,杨扬.云计算环境下基于动态博弈论的用户行为模型与分析[J].电子学报,2011,8:1818-1823 [9] Niyato D,Vasilakos A V.Resource and Revenue Sharing withCoalition Formation of Cloud Providers:Game Theoretic Approach[C]∥CCGrid.Newport Beach,CA,USA,2011:215-224 [10] Karnwal T,Sivakumar T,Aghila G.A Comber Approach toProtect Cloud Copmputing against XML DDoS and HTTP DDoS attack[C]∥SCEECS,Bhopal,India,2012:1-5 [11] Chen Qi,Lin Wen-min,Dou Wan-chun,et al.CBF:A Packet Filtering Method for DDoS Attack Defense in Cloud Environment[C]∥DASC.Sydney,Australia,2011:427-434 [12] 谢立军,朱智强,孙磊,等.基于隶属度理论的云服务行为信任评估模型研究[J].计算机应用研究,2012,30(4):1051-1054 [13] Niyato D,Wang P,Hossain E,et al.Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments[C]∥WCNC.Shanghai,China,2012:3128-3133 [14] 张维迎.博弈论与信息经济学[M].上海:上海人民出版社,2004 |
No related articles found! |
|