Login / Signup
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks.
Chongzhou Fang
Han Wang
Najmeh Nazari
Behnam Omidi
Avesta Sasan
Khaled N. Khasawneh
Setareh Rafatirad
Houman Homayoun
Published in:
NDSS (2022)
Keyphrases
</>
cloud computing
traffic analysis
countermeasures
data center
security risks
attack detection
databases
intrusion detection
scheduling algorithm
grid computing
ddos attacks
security threats