Login / Signup

An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments.

Sasha Mahdavi HezavehiRouhollah Rahmani
Published in: Clust. Comput. (2020)
Keyphrases
  • third party
  • computing environments
  • anomaly detection
  • cloud computing
  • intrusion detection
  • sensitive information