Web Server Workload Characterization: The Search for Invariants, Proceedings of the ACM SIGMETRICS '96 Conference, pp.126-137, 1996. ,
DOI : 10.1145/233008.233034
The NIST Definition of Cloud Computing (Draft) NIST Special Publication 800-145, pp.6-10, 2011. ,
Choosing reputable servents in a P2P network, Proceedings of the eleventh international conference on World Wide Web , WWW '02, pp.65-69, 2002. ,
DOI : 10.1145/511446.511496
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.9044
Rate of change and other metrics: a live study of the World Wide Web, Proceedings of USENIX Symposium on Internetworking Technologies and Systems, pp.1-13, 1997. ,
Fine-grained capabilities for flooding DDoS defense using client reputations, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, pp.105-112, 2007. ,
DOI : 10.1145/1352664.1352668
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-13, 2006. ,
DOI : 10.1109/INFOCOM.2006.127
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.8279
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks, International Conference on Networking and Services (ICNS '07), pp.54-56, 2007. ,
DOI : 10.1109/ICNS.2007.5
Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS, 2010 IEEE 3rd International Conference on Cloud Computing, pp.55-65, 2010. ,
DOI : 10.1109/CLOUD.2010.37
Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI, IEEE Internet Computing, vol.6, issue.2, pp.86-93, 2002. ,
DOI : 10.1109/4236.991449
Cloud Computing Identity Management, SETLabs Briefings, Vol7 No7, pp.45-55, 2009. ,
A Novel Model for Detecting Application Layer DDoS Attacks Computer and Computational Sciences, IMSCCS '06 First International Multi- Symposiums, 2006. ,
DOI : 10.1109/imsccs.2006.159