2020
DOI: 10.1007/s10586-019-03031-y
|View full text |Cite
|
Sign up to set email alerts
|

An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 30 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…The evaluated density functions for the group j at location F set . Further, the estimated density values are then allowed to the neurons in the summation layer, which combines the data from the n training cases with prior probabilities given in Equation (23).…”
Section: Neural Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…The evaluated density functions for the group j at location F set . Further, the estimated density values are then allowed to the neurons in the summation layer, which combines the data from the n training cases with prior probabilities given in Equation (23).…”
Section: Neural Networkmentioning
confidence: 99%
“…In 2020, Mahdavi et al 23 examined an anomaly‐based DDoS assault detection framework in a cloud environment using a TPA. Second, they introduced simulation tests to validate the proposed work by providing some configurations and assumptions of cloud environments.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation