Login / Signup
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks.
Chongzhou Fang
Han Wang
Najmeh Nazari
Behnam Omidi
Avesta Sasan
Khaled N. Khasawneh
Setareh Rafatirad
Houman Homayoun
Published in:
CoRR (2021)
Keyphrases
</>
countermeasures
cloud computing
malicious attacks
watermarking scheme
security mechanisms
traffic analysis
attack detection
data sets
databases
neural network
location information