Login / Signup
An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments.
Sasha Mahdavi Hezavehi
Rouhollah Rahmani
Published in:
Clust. Comput. (2020)
Keyphrases
</>
third party
computing environments
anomaly detection
cloud computing
intrusion detection
sensitive information