Login / Signup
A slow read attack using cloud.
Darine Ameyed
Fehmi Jaafar
Jaouhar Fattahi
Published in:
ECAI (2015)
Keyphrases
</>
cloud computing
database
virtual machine
countermeasures
ddos attacks
data sets
open source
cloud computing environment
neural network
information systems
data structure
data management
encryption algorithm
block cipher
malicious users