Open Access

Emphasis on Cloud Optimization and Security Gaps: A Literature Review


Cite

1. Karampaglis, Z., A. Gounaris, Y. Manolopoulos. A Bi-Objective Cost Model for Database Queries in a Multi-Cloud Environment. – Journal of Innovation in Digital Ecosystems, Vol. 1, December 2014, No 1-2, pp. 12-25.10.1016/j.jides.2015.02.002Search in Google Scholar

2. Chen, Z., G. X u, V. Mahalingam, L. Ge, J. Nguyen, W. Y u, C. Lu. A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures. – Big Data Research, November 2015, In Press.10.1016/j.bdr.2015.11.002Search in Google Scholar

3. Xu, Y., K. Li, L. He, T. K. Truong. A DAG Scheduling Scheme on Heterogeneous Computing Systems Using Double Molecular Structure-Based Chemical Reaction Optimization. – J. Parallel Distrib. Comput., Vol. 73, September 2013, No 9, pp. 1306-1322.10.1016/j.jpdc.2013.05.005Search in Google Scholar

4. Han, Y., T. Alpcan, J. Chan, C. Leckie, B. I. P. Rubinstein. A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning. – IEEE Transactions on information Forensics and Security, Vol. 11, March 2016, No 3, pp. 556-570.10.1109/TIFS.2015.2505680Search in Google Scholar

5. Konak, A., S. K. Konak, L. V. Snyder. A Game-Theoretic Genetic Algorithm for the Reliable Server Assignment Problem under Attacks. – Computers & Industrial Engineering, Vol. 85, July 2015, pp. 73-85.10.1016/j.cie.2015.02.028Search in Google Scholar

6. Ahmad, S. G., C. S. Liew, E. U. Munir, T. F. Ang, S. U. Khan. A Hybrid Genetic Algorithm for Optimization of Scheduling Workflow. – Applications in Heterogeneous Computing Systems, Vol. 87, January 2016, pp. 80-90.10.1016/j.jpdc.2015.10.001Search in Google Scholar

7. Barati, M., S. Sharifian. A Hybrid Heuristic-Based Tuned Support Vector Regression Model for Cloud Load Prediction. – J. Supercomput., Vol. 71, November 2015, No 11, pp. 4235-4259.10.1007/s11227-015-1520-ySearch in Google Scholar

8. Chen, J. H., F. Abedin, K. M. Chao, N. Godwin, Y. Li, C. F. Tsai. A Hybrid Model for Cloud Providers and Consumers to Agree on QoS of Cloud Services – Future Generation Computer Systems, Vol. 50, September 2014, pp. 38-48.10.1016/j.future.2014.12.003Search in Google Scholar

9. Karami, A., M. G. Zapata. A Hybrid Multiobjective RBF-PSO Method for Mitigating DoS Attacks in Named Data Networking. – Neurocomputing, Vol. 3, March 2015, No 3, pp. 1262-1282.10.1016/j.neucom.2014.11.003Search in Google Scholar

10. Wu, Z., X. Liu, Z. Ni, D. Yuan, Y. Yang. A Market-Oriented Hierarchical Scheduling Strategy in Cloud Workflow Systems. – J. Supercomput, Vol. 63, January 2013, No 1, pp. 256-293.10.1007/s11227-011-0578-4Search in Google Scholar

11. Bamakan, S. M. H., B. Amiri, M. Mirzabagheri, Y. Shi. A New Intrusion Detection Approach Using PSO Based Multiple Criteria Linear Programming. – Procedia Computer Science, Vol. 55, 2015, pp. 231-237.10.1016/j.procs.2015.07.040Search in Google Scholar

12. Singh, A., D. Juneja, M. Malhotra. A Novel Agent Based Autonomous and Service Composition Framework for Cost Optimization of Resource Provisioning in Cloud Computing. – Journal of King Saud University – Computer and Information Sciences, Vol. 29, 2017, No 1, pp. 19-28.10.1016/j.jksuci.2015.09.001Search in Google Scholar

13. Shu, W., W. Wang, Y. Wang. A Novel Energy-Efficient Resource Allocation Algorithm Based on Immune Clonal Optimization for Green Cloud Computing. – EURASIP Journal on Wireless Communications and Networking, Vol. 64, December 2014.10.1186/1687-1499-2014-64Search in Google Scholar

14. Koehler, M. An Adaptive Framework for Utility-Based Optimization of Scientific Applications in the Cloud. – Journal of Cloud Computing, Vol. 3, December 2014, No 4.10.1186/2192-113X-3-4Search in Google Scholar

15. Liu, Q., C. Weng, M. Li, Y. Luo. An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds, Vol. 8, November 2010, No 6, pp. 56-62.10.1109/MSP.2010.143Search in Google Scholar

16. Jiang, D., Z. Xu, J. Liu, W. Zhao. An Optimization-Based Robust Routing Algorithm to Energy-Efficient Networks for Cloud Computing. – Telecommun. Syst., March 2015, pp. 1-10.10.1007/s11235-015-9975-ySearch in Google Scholar

17. Grzonka, D., J. Kołodziej, J. Tao, S. U. Khan. Artificial Neural Network Support to Monitoring of the Evolutionary Driven Security Aware Scheduling in Computational Distributed Environments. – Future Generation Computer Systems, Vol. 51, October 2015, pp. 72-86.10.1016/j.future.2014.10.031Search in Google Scholar

18. Folino, G., F. S. Pisani. Automatic Offloading of Mobile Applications into the Cloud by Means of Genetic Programming. – Applied Soft Computing, Vol. 25, December 2014, pp. 253-265.10.1016/j.asoc.2014.09.016Open DOISearch in Google Scholar

19. Singh, A., D. Juneja, M. Malhotra. Autonomous Agent Based Load Balancing Algorithm in Cloud Computing. – Procedia Computer Science, Vol. 45, 2015, pp. 832-841.10.1016/j.procs.2015.03.168Search in Google Scholar

20. Pacini, E., C. Mateos, C. G. Garino. Balancing Throughput and Response Time in Online Scientific Clouds via Ant Colony Optimization (SP2013/2013/00006). – Adv. Eng. Softw., Vol. 84, June 2015, pp. 31-47.10.1016/j.advengsoft.2015.01.005Search in Google Scholar

21. Lin, H., J. Shao, C. Zhang, Y. Fang. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. – IEEE Transactions on Information Forensics and Security, Vol. 8, June 2013, No 6, pp. 985-997.10.1109/TIFS.2013.2255593Search in Google Scholar

22. Moghaddam, F. F., R. F. Moghaddam, M. Cheriet. Carbon-Aware Distributed Cloud: Multi-Level Grouping Genetic Algorithm. – Cluster Computing, Vol. 18, March 2015, No 1, pp. 477-491.10.1007/s10586-014-0359-ySearch in Google Scholar

23. Mamun, K. A. A., M. Alhussein, K. Sailunaz, M. S. I s l a m. Cloud Based Framework for Parkinson’s Disease Diagnosis and Monitoring System for Remote Healthcare Applications. – Future Generation Computer Systems, November 2015 (In Press).Search in Google Scholar

24. Arangoa, I. M., J. S. Izquierdo, E. O. G. Campbell, R. P. Garciab. Cloud-Based Decision Making in Water Distribution Systems. – Procedia Engineering, Vol. 89, 2014, pp. 488-494.10.1016/j.proeng.2014.11.241Search in Google Scholar

25. Alkhanak, E. N., S. P. Lee, R. Rezai, R. M. Parizi. Cost Optimization Approaches for Scientific Workflow Scheduling in Cloud and Grid Computing: A Review, Classifications, and Open Issues. – Journal of Systems and Software, Vol. 113, March 2016, pp. 1-26.10.1016/j.jss.2015.11.023Search in Google Scholar

26. Huo, Y., Y. Zhuang, J. J. Gu, S. Ni, Y. Xue. Discrete Gbest-Guided Artificial Bee Colony Algorithm for Cloud Service Composition. – Appl Intell, Vol. 42, June 2015, No 4, pp. 661-678.10.1007/s10489-014-0617-ySearch in Google Scholar

27. Suguna, S., A. Suhasini. Enriched Multi Objective Optimization Model Based Cloud Disaster Recovery. – Karbala International Journal of Modern Science, Vol. 1, October 2015, No 2, pp. 122-128.10.1016/j.kijoms.2015.09.001Search in Google Scholar

28. Navimipour, N. J., A. M. Rahmani, A. H. Navin, M. Hosseinzadeh. Expert Cloud: A Cloud-Based Framework to Share the Knowledge and Skills of Human Resources. – Computers in Human Behavior, Vol. 46, 2015, pp. 57-74.10.1016/j.chb.2015.01.001Search in Google Scholar

29. Zhu, S., G. Gong. Fuzzy Authorization for Cloud Storage. – IEEE Transactions on Cloud Computing, Vol. 2, July 2014, No 4, pp. 422-435.10.1109/TCC.2014.2338324Search in Google Scholar

30. Palmieri, F., U. Fiore, S. Ricciardi, A. Castiglione. GRASP-Based Resource Re-Optimization for Effective Big Data Access in Federated Clouds. – Future Generation Computer Systems, Vol. 54, January 2016, pp. 168-179.10.1016/j.future.2015.01.017Open DOISearch in Google Scholar

31. Bittencourt, L. F., E. R. M. Madeira. HCOC: A Cost Optimization Algorithm for Workflow Scheduling in Hybrid Clouds. – J. Internet Serv Appl., Vol. 2, 2011, No 3, pp. 207-227.10.1007/s13174-011-0032-0Search in Google Scholar

32. Rao, K. S., P. S. Thilagam. Heuristics Based Server Consolidation with Residual Resource Defragmentation in Cloud Data Centers. – Future Generation Computer Systems, Vol. 50, September 2015, pp. 87-98.10.1016/j.future.2014.09.009Search in Google Scholar

33. Jula, A., Z, Othman, E. Sundararajan. Imperialist Competitive Algorithm with PROCLUS Classifier for Service Time Optimization in Cloud Computing Service Composition. – Expert Systems with Applications, Vol. 42, January 2015, No 1, pp. 135-145.10.1016/j.eswa.2014.07.043Search in Google Scholar

34. Huu, T. T., G. Koslovski, F. Anhalt, J. Montagnat, P. V. B. Primet. Joint Elastic Cloud and Virtual Network Framework for Application Performance-Cost Optimization. – J. Grid Computing, Vol. 9, March 2011, No 1, pp. 27-47.10.1007/s10723-010-9168-6Search in Google Scholar

35. Ge, X., B. Yao, M. Guo, C. L. Xu. LSShare: An Efficient Multiple Query Optimization System in the Cloud. – Distrib. Parallel Databases, Vol. 32, December 2014, No 4, pp. 583-605.10.1007/s10619-014-7150-1Search in Google Scholar

36. Lua, R., K. C. Yow. Mitigating DDoS Attacks with Transparent and Intelligent Fast-Flux Swarm Network. – IEEE Network, Vol. 25, July-August 2011, No 4, pp. 28-33.10.1109/MNET.2011.5958005Open DOISearch in Google Scholar

37. Yildirim, E., J. Kimb, T. Kosar. Modeling Throughput Sampling Size for a Cloud-Hosted Data Scheduling and Optimization Service. – Future Generation Computer Systems, Vol. 29, September 2013, No 7, pp. 1795-1807.10.1016/j.future.2013.01.003Search in Google Scholar

38. Wang, J., B. Gong, H. Liu, S. Li. Multidisciplinary Approaches to Artificial Swarm Intelligence for Heterogeneous Computing and Cloud Scheduling. – Appl. Intell., Vol. 43, October 2015, No 2, pp. 662-675.10.1007/s10489-015-0676-8Search in Google Scholar

39. Fang, D., X. Liu, L. Liu, H. Yang. OCSO: Off-the-Cloud Service Optimization for Green Efficient Service Resource Utilization. – Journal of Cloud Computing: Advances, Systems and Applications, Vol. 3, December 2014, No 9.10.1186/s13677-014-0009-1Search in Google Scholar

40. Li, J., M. Qiu, Z. Mingb, G. Quan, X. Qin, Z. Gu. Online Optimization for Scheduling Preemptable Tasks on IaaS Cloud Systems. – J. Parallel Distrib. Comput., Vol. 72, May 2012, No 5, pp. 666-677.10.1016/j.jpdc.2012.02.002Search in Google Scholar

41. Chandrasekaran, M., M. Muralidhar, U.S. Dixit. Online Optimization of Multipass Machining Based on Cloud Computing. – Int. J. Adv. Manuf. Technol., Vol. 65, March 2013, No 1, pp. 239-250.10.1007/s00170-012-4163-7Search in Google Scholar

42. Shi, Y., W. W. Bo. Physical Layer Security Strategies for Downlink Heterogeneous Cloud Radio Access Networks. – The Journal of China Universities of Posts and Telecommunications, Vol. 21, October 2014, No 5, pp. 47-54.10.1016/S1005-8885(14)60330-7Search in Google Scholar

43. Sun, Y., J. White, S. Eade, D. C. Schmidt. ROAR: AQoS-Oriented Modeling Framework for Automated Cloud Resource Allocation and Optimization. – Journal of Systems and Software, 2015.10.1016/j.jss.2015.08.006Search in Google Scholar

44. Zeng, L., B. Veeravalli, X. Li. SABA: A Security-Aware and Budget-Aware Workflow Scheduling Strategy in Clouds. – J. Parallel Distrib. Comput., Vol. 75, January 2015, pp. 141-151.10.1016/j.jpdc.2014.09.002Search in Google Scholar

45. Huang, X., B. Du, L. Sun, F. Chen, W. Dai. Service Requirement Conflict Resolution Based on Ant Colony Optimization in Group-Enterprises-Oriented Cloud Manufacturing. – Int. J. Adv. Manuf. Technol., October 2015, pp. 1-14.10.1007/s00170-015-7961-xSearch in Google Scholar

46. Sindhu, R., H. K. Gill, S. K. Sood. Smart Monitoring and Controlling of Pandemic Influenza A (H1N1) Using Social Network Analysis and Cloud Computing. – Journal of Computational Science January 2016, pp. 11-22.10.1016/j.jocs.2015.11.001718578232362959Search in Google Scholar

47. Liu, H., A. Abraham, V. Snasel, Sean McLoone. Swarm Scheduling Approaches for Work-Flow Applications with Security Constraints in Distributed Data-Intensive Computing Environments. – Information Sciences, Vol. 192, June 2012, pp. 228-243.10.1016/j.ins.2011.12.032Search in Google Scholar

48. Abdullahi, M., M. A. Ngadi, S. M. Abdulhamid. Symbiotic Organism Search Optimization Based Task Scheduling in Cloud Computing Environment. – Future Generation Computer Systems, Vol. 56, March 2016, pp. 640-650.10.1016/j.future.2015.08.006Search in Google Scholar

49. Mehrotra, R., S. Srivastava, I. Banicescu, S. Abdelwahed. Towards an Autonomic Performance Management Approach for a Cloud Broker Environment Using a Decomposition-Coordination Based Methodology. – Future Generation Computer Systems, Vol. 54, January 2016, pp. 195-205.10.1016/j.future.2015.03.020Search in Google Scholar

50. Zineddine, M. Vulnerabilities and Mitigation Techniques Toning in the Cloud A Cost and Vulnerabilities Coverage Optimization Approach Using Cuckoo Search Algorithm with Levy Flights. – Conputer Security, Vol. 48, 2015.10.1016/j.cose.2014.09.002Search in Google Scholar

51. Singh, A., M. Malhotra. Analysis for Exploring Scope of Mobile Agents in Cloud Computing. – Int. J. Adv. Technol., Vol. 3, 2012, No 3.Search in Google Scholar

52. Mell, P., T. Grance. Perspectives on Cloud Computing and Standards. National Institute of Standards and Technology (NIST), Information Technology Laboratory, 2009.Search in Google Scholar

53. CERT. Retrieved January 2013. http://www.cert.org/Search in Google Scholar

54. Tendulkar, V., J. Pletcher, A. Shashidharan. Abusing Cloud-Based Browsers for Fun and Profit. – In: Proc. of 28th Annual Computer Security Applications Conference, New York, NY, USA, ACM, 2012, pp. 219-228.10.1145/2420950.2420984Search in Google Scholar

55. Racoma, J. A. “Epic Hacking” Incident Brought about by Apple, Amazon Cloud Security Flaws. Retrieved December 2012. http://www.cmswire.com/cms/information-management/epic-hacking-incident-brought-about-by-apple-amazoncloud-security-flaws-016845.php; 2012Search in Google Scholar

56. Kennedy, J. Latest Cyber Attack on Sony a Breach Too Far for Entire Cloud Industry. Retrieved December 2012. http://siliconrepublic.com/cloud/item/21613-latest-cyber-attack-onsony; 2011Search in Google Scholar

57. Millan, R. M. Hackers Find a Home in Amazon’s EC2 Cloud, Retrieved December 2012. http://www.infoworld.com/d/cloud-computing/hackers-find-home-in-amazons-ec2-cloud-742, 2009.Search in Google Scholar

58. Chen, Y., V. Paxson, R. Katz. What’s New About Cloud Computing Security? Tech. Rep. No UCB/EECS-2010-5, Berkeley, 2010.Search in Google Scholar

59. Barron, C., H. Yu, J. Zhan. Cloud Computing Security Case Studies and Research. – In: Proc. of World Congress on Engineering, Vol. II, 2013, London, UK.Search in Google Scholar

60. Wood, R. K. Deterministic Network Interdiction. – Mathematical and Computer Modelling, Vol. 17, January 1993, No 2, pp. 1-18.10.1016/0895-7177(93)90236-RSearch in Google Scholar

61. Smith, J. C., C. Lim, F. Sudargho. Survivable Network Design under Optimal and Heuristic Interdiction Scenarios. – Journal of Global Optimization, Vol. 38, June 2007, No 2, pp. 181-199.10.1007/s10898-006-9067-3Open DOISearch in Google Scholar

62. Akgun, L., B. C. Tansel, R. K. Wood. The Multi-Terminal Maximum-Flow Network-Interdiction Problem. – European Journal of Operational Research, Vol. 211, June 2011, No 2, pp. 241-251.10.1016/j.ejor.2010.12.011Search in Google Scholar

63. Marquez, J. E. R., C. M. Rocco, G. Levitin. Optimal Network Protection against Diverse Interdictor Strategies. – Reliability Engineering & System Safety, Vol. 96, March 2011, No 3, pp. 374-382.10.1016/j.ress.2010.10.003Search in Google Scholar

64. Marquez, J. E. R., S. C. M. Rocco. Stochastic Network Interdiction Optimization via Capacitated Network Reliability Modeling and Probabilistic Solution Discovery. – Reliability Engineering & System Safety, Vol. 94, May 2009, No 5, pp. 913-921.10.1016/j.ress.2008.10.006Search in Google Scholar

65. Calvete, H. L., C. Gale, P. M. Mateo. A New Approach for Solving Linear Bilevel Problems Using Genetic Algorithms. – European Journal of Operational Research, Vol. 188, July 2008, No 1, pp. 14-28.10.1016/j.ejor.2007.03.034Search in Google Scholar

66. Hejazi, S. R., A. Memariani, G. Jahanshahloo, M. M. Sepehri. Linear Bilevel Programming Solution by Genetic Algorithm. – Computers & Operations Research, Vol. 29, November 2002, No 13, pp. 1913-1925.10.1016/S0305-0548(01)00066-1Search in Google Scholar

67. Mathieu, R., L. Pittard, G. Anandalingam. Genetic Algorithm Based Approach to Bi-Level Linear Programming. – RAIRO Recherche Operationnelle, Vol. 28, 1994, No 1, pp. 1-21.10.1051/ro/1994280100011Search in Google Scholar

68. Wang, G. M., X. J. Wang, Z. P. Wan, S. H. Jia. An Adaptive Genetic Algorithm for Solving Bilevel Linear Programming Problem. – Applied Mathematics and Mechanics, Vol. 28, December 2007, pp. 1605-1612.10.1007/s10483-007-1207-1Search in Google Scholar

69. Wang, G. M., Z. P. Wan, X. J. Wang, Y. L. Chen. Genetic Algorithms for Solving Linear Bilevel Programming. – In: 6th International Conference on Parallel and Distributed Computing, Applications and Technologies, IEEE, December 2005, pp. 920-924.Search in Google Scholar

70. Kim, J. R., J. U. Lee, J. B. Jo. Hierarchical Spanning Tree Network Design with Nash Genetic Algorithm. – Computers & Industrial Engineering, Vol. 56, April 2009, No 3, pp. 1040-1052.10.1016/j.cie.2008.09.030Open DOISearch in Google Scholar

71. Lee, J., B. Tierney, W. Johnston. Data Intensive Distributed Computing: A Medical Application Example. – Lecture Notes in Computer Science, Vol. 1593, 1999, pp. 150-158.Search in Google Scholar

72. Horn, W. AI in Medicine on Its Way from Knowledge-Intensive to Data-Intensive Systems. – Artificial Intelligence in Medicine, Vol. 23, August 2001, No 1, pp. 5-12.10.1016/S0933-3657(01)00072-0Search in Google Scholar

73. Zhong, N., J. Hu, S. Motomura, J. Wu, C. Liu. Building a Data-Mining Grid for Multiple Human Brain Data Analysis. – Computational Intelligence, Vol. 21, May 2005, No 2, pp. 177-196.10.1111/j.0824-7935.2005.00270.xSearch in Google Scholar

74. Boccia, A., G. Busiello, L. Milanesi, G. Paolella. A Fast Job Scheduling System for a Wide Range of Bioinformatic Applications. – IEEE Transactions on NanoBioscience, Vol. 6, June 2007, No 2, pp. 149-154.10.1109/TNB.2007.89747417695750Open DOISearch in Google Scholar

75. Hey, T., S. Tansley, K. Tolle. The Fourth Paradigm: Data-Intensive Scientific Discovery. Microsoft Research, 2009.Search in Google Scholar

76. Eberhart, R., Y. Shi. Comparison between Genetic Algorithms and Particle Swarm Optimization. – In: Lecture Notes in Computer Science, Vol. 1447, 1998, pp. 611-618.Search in Google Scholar

77. Boeringer, D., D. Werner. Particle Swarm Optimization Versus Genetic Algorithms for Phased Array Synthesis. – IEEE Transactions on Antennas and Propagation, Vol. 52, April 2004, No 3, pp. 771-779.10.1109/TAP.2004.825102Search in Google Scholar

78. Abraham, A., H. Guo, H. Liu. Swarm Intelligence: Foundations, Perspectives and Applications. – Swarm Intelligent Systems, Studies in Computational Intelligence, Vol. 26, 2006, pp. 3-25.10.1007/978-3-540-33869-7_1Search in Google Scholar

79. Das, S., A. Abraham, A. Konar. Automatic Kernel Clustering with a Multi-Elitist Particle Swarm Optimization Algorithm. – Pattern Recognition Letters, Vol. 29, April 2008, No 5, pp. 688-699.10.1016/j.patrec.2007.12.002Open DOISearch in Google Scholar

80. Liu, H., A. Abraham, Z. Wang. A Multi-Swarm Approach to Multi-Objective Flexible Job-Shop Scheduling Problems. – Fundamenta Informaticae, Vol. 95, 2009, 2009, pp. 1-25.10.3233/FI-2009-160Search in Google Scholar

81. Rashidi, M. R. A., M. E. E. Hawary. A Survey of Particle Swarm Optimization Applications in Electric Power Systems. – IEEE Transactions on Evolutionary Computation, Vol. 13, August 2009, No 4, pp. 913-918.10.1109/TEVC.2006.880326Search in Google Scholar

82. Babaoglu, I., O. Findik, E. Ilker. A Comparison of Feature Selection Models Utilizing Binary Particle Swarm Optimization and Genetic Algorithm in Determining Coronary Artery Disease Using Support Vector Machine. – Expert Systems with Applications, Vol. 37, April 2010, No 4, pp. 3177-3183.10.1016/j.eswa.2009.09.064Search in Google Scholar

83. Sundar, S., A. Singh. A Swarm Intelligence Approach to the Quadratic Minimum Spanning Tree Problem. – Information Sciences, Vol. 180, September 2010, No 17, pp. 3182-3191.10.1016/j.ins.2010.05.001Search in Google Scholar

84. Cao, J., J. Chen, Q. Zhao. An Optimized Scheduling Algorithm on a Cloud Workflow Using a Discrete Particle Swarm. – Cybernetics and Information Technologies, Vol. 14, March 2014, No 1, pp. 25-39.10.2478/cait-2014-0003Search in Google Scholar

85. Ch. N., S. N. Iyengar, G. Ganapathy. Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment. – Cybernetics and Information Technologies, Vol. 15, July 2015, No 2, pp. 119-140.10.1515/cait-2015-0033Search in Google Scholar

86. Jeyanthi, N., P. C. Mogankumar. A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks. – Cybernetics and Information Technologies, Vol. 14, September 2014, No 3, pp. 71-85.10.2478/cait-2014-0034Open DOISearch in Google Scholar

87. Govinda, K., E. Sathiyamoorthy. Privacy Preservation of a Group and Secure Data Storage in Cloud Environment. – Cybernetics and Information Technologies, Vol. 15, March 2015, No 1, pp. 46-54.10.1515/cait-2015-0005Search in Google Scholar

88. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography in Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, November 2015, No 4, pp. 111-123.10.1515/cait-2015-0058Search in Google Scholar

89. Volland, J., A. Fugener, J. O. Brunner. A Column Generation Approach for the Integrated Shift and Task Scheduling Problem of Logistics Assistants in Hospitals. – European Journal of Operational Research, Vol. 260, July 2017, pp. 316-334.10.1016/j.ejor.2016.12.026Search in Google Scholar

90. Kuzmanovic, A., E. W. Knightley. Low-Rate TCP-Targeted Denial of Service Attacks. – In: Proc. of Conference on Applications, 2003, pp. 75-86.10.1145/863955.863966Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology