Sign in
Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure.
Tulha Al-Salah
Liang Hong
Sachin Shetty
Published in:
EDGE (2017)
Keyphrases
</>
surface reconstruction
three dimensional
object recognition
d objects
computing infrastructure
virtual machine
ddos attacks
data encryption
malicious users
surface features
surface model
object surface
information exchange
resource management
range data
data center
vector field
viewpoint