References
- Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi. "CLB-ECC: Certificateless Blind Signature Using ECC", Journal of Information Processing Systems(JIPS), Vol. 13, pp. 392-397, 2017.
- Mihir Bellare, Anand Desai, David Pointcheval; Phillip Rogaway, "Lecture Notes in Computer Science", CRYPTO: Annual International Cryptology Conference, Vol. 1462, pp. 26-45, 1998.
- Ki-Woong Park, Jaesun Han, JaeWoong Chun and Kyu Ho Park, "THEMIS: A mutually Verifiable Billing System for the Cloud Computing Environment", IEEE Transactions on Services Computing, Vol. 6, Issue 3, pp. 300-313, 2013. https://doi.org/10.1109/TSC.2012.1
- Saket Acharya and Namita Tiwari, "Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities", IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 18, Issue 3, pp. 68-76, 2016.
- Won Min Kang, Seo Yeon Moon and Jong Hyuk Park, "An enhanced security framework for home applicances in smart home", Human-centric Computing and Information Sciences(HCIS), 2017.
- Syed Mujtiba Hussain and Ghulam Rasool Beigh, "Impact of DDoS attack (UDP Flooding) on queuing models", 4th International Conference on Computer and Communication Technology (ICCCT), pp.210-216, 2013.
- Neha Gupta, Ankur Jain, Pranav Saini and Vaibhav Gupta, "DDoS attack algorithm using ICMP flood", Computing for Sustainable Global Development(INDIACom), pp. 4082-4084, 2016.
- Dimitrios Moustis and Panayiotis Kotzanikolaou, "Evaluating security controls against HTTP-based DDoS attacks", 4th International Conference on Information Intelligence, Systems and Applications (IISA), 2013.
- Wei Chen and Dit-Yan Yeung, "Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing", Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006.
- Nathan Keegan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolate and Byunggu Yu, "A survey of cloud-based network intrusion detection analysis", Human-centric Computing and Information Sciences, 2016.
- U. Maulik and S. Bandyopadhyay, "Performance evaluation of some clustering algorithms and validity indices", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, Issue 12, pp.1650-1654, 2002. https://doi.org/10.1109/TPAMI.2002.1114856
- Sharmila and Mukesh Kumar, "An optimized farthest first clustering algorithm", Nirma University International Conference on Engineering (NUiCONE), 2013.
- Seema Bandyopadhyay and E. J. Coyle, "An energy efficient hierarchical clustering algorithm for wireless sensor networks", INFOCOM, Vol. 3, pp.1713-1723, 2003.
- R.Inokuchi and S. Miyamoto, "LVQ clustering and SOM using a kernel function", International Conference on Fuzzy System, Vol. 3, pp.1497-1500, 2004.
- Sin-seok Seo, Young J. Won and James Won-Ki Hong, "Witnessing Distributed Denial-of-Service traffic from an attacker's network", Network and Service Management (CNSM), pp. 241-247, 2011.
Cited by
- Security in Network Virtualization: A Survey vol.17, pp.4, 2018, https://doi.org/10.3745/jips.04.0220