[1. Ablett, E., D. Bellizzi, J. Byers, S. Cove, M. Dobrusin, A. Frey, J. Hanke. Encryption Advantages and Disadvantages. 2014. http://networking116.wikispaces.com/Encryption+Advantages+and+Disadvantages]Search in Google Scholar
[2. Al-Haidari, F., M. Sqalli, K. Salah. Enhanced EDo S-Shield for Mitigating EDo S Attacks Originating from Spoofed IP Addresses. - In: Proc. of 11th Int. Conf. Trust Secur. Priv. Comput. Commun., IEEE, 2012 [Cited 16 December 2016], pp. 1167-1174. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=629610910.1109/TrustCom.2012.146]Search in Google Scholar
[3. Alosaimi, W., K. Al-Begain. A New Method to Mitigate the Impacts of Economical Denial of Sustainability Attacks Against the Cloud. - In: Proc. of 14th Annu. Post. Grad. Symp. Converg. Telecommun. Netw. Broadcating. Liverpool John Moores University, Liverpool, UK, 2013, pp. 116-121.]Search in Google Scholar
[4. Aslan, T. Cloud Physical Security Considerations. IBM Cloud, 2012 [Cited 15 February 2017]. http://thoughtsoncloud.com/index.php/2012/02/cloud-physical-security-considerations/]Search in Google Scholar
[5. Beitollahi, H., G. Deconinc k. FOSe L: Filtering by Helping an Overlay Security Layer to Mitigate Do S Attacks. - In: Proc. of 7th IEEE Int. Symp. Netw. Comput. Appl., IEEE, July 2008 [Cited 16 December 2016], pp. 19-28. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4579635]Search in Google Scholar
[6. Beitollahi, H., G. Deconinc k. Analyzing Well-Known Countermeasures Against Distributed Denial of Service Attacks. - Comput. Commun., Elsevier B. V., Vol. 35, Jun 2012, No 11 [Cited 8 October 2016], pp. 1312-1332. http://linkinghub.elsevier.com/retrieve/pii/S014036641200121110.1016/j.comcom.2012.04.008]Search in Google Scholar
[7. Chen, E. Y. Detecting TCP-Based DDo S Attacks by Linear Regression Analysis. Signal Process Inf. Technol. - In: Proc. of 5th IEEE Int. Symp., Athens, IEEE, 2005, pp. 381-386.]Search in Google Scholar
[8. Choi, Y., J. Oh, J. Jang, J. Ryou. Integrated DDo S Attack Defense Infrastructure for Effective Attack Prevention. - In: Proc. of 2nd IEEE Int. Conf. Inf. Technol. Converg. Serv., IEEE, 2010, pp. 1-6.10.1109/ITCS.2010.5581263]Search in Google Scholar
[9. Chopade, S. S., K. U. Pandey, D. S. Bhade. Securing Cloud Servers Against Flooding Based DDOS Attacks. - In: Proc. of Int. Conf. Commun. Syst. Netw. Technol., IEEE, 2013 [Cited 8 October 2016], pp. 524-528. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=652445110.1109/CSNT.2013.114]Search in Google Scholar
[10. Du, P., A. Nakao. DDo S Defense asa Network Service. - In: Proc. of IEEE Netw. Oper. Manag. Symp. (NOMS’10), IEEE, 2010, 894-897. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5488345]Search in Google Scholar
[11. ENISA. Cloud Computing Risk Assessment. Eur. Netw. Inf. Secur. Agency, 2009, pp. 9-10. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment]Search in Google Scholar
[12. Fortinet, C. Network and Physical Security in the Cloud. - In: Proc. of Asia Cloud Forum, 2011 [Cited 14 August 2016]. http://www.asiacloudforum.com/content/network-and-physical-security-cloud10.1016/S1353-4858(11)70040-X]Search in Google Scholar
[13. Foster, I., Y. Zhao, I. Raicu, S. Lu. Cloud Computing and Grid Computing 360. - In: Proc. of Grid Comput. Environ. Work (GCE’08), IEEE, 2008, pp. 1-10.10.1109/GCE.2008.4738445]Search in Google Scholar
[14. Heng, C. Security Issues in Writing PHP Scripts-And How PHP 4.1.0/4.2.0+ Will Change Your Scripts. 2011. http://www.thesitewizard.com/archive/phpsecurity.shtml]Search in Google Scholar
[15. Hoff, C. Cloud Computing Security: From DDo S (Distributed Denial of Service) to EDo S (Economic Denial of Sustainability). - Ration. Surviv., 2008 [Cited 27 September 2016]. http://rationalsecurity.typepad.com/blog/2008/11/cloud-computing-security-from-ddosdistributed-denial-of-service-to-edos-economic-denial-of-sustaina.html]Search in Google Scholar
[16. Hoff, C. A Couple of Follow-Ups on The EDo S (Economic Denial of Sustainability) Concept. - Ration. Surviv., 2009 [Cited 26 January 2013]. http://www.rationalsurvivability.com/blog/2009/01/a-couple-of-follow-ups-on-the-edoseconomic-denial-of-sustainability-concept/]Search in Google Scholar
[17. Intel. What’s Holding Back the Cloud?, 2012 [Cited 26 September 2016]. http://www.intel.com/content/www/us/en/cloud-computing/whats-holding-back-thecloud-peer-research-report.html]Search in Google Scholar
[18. Jemec, M. Ethernet Packet Generator. 2014. http://sourceforge.net/projects/packeth/files/]Search in Google Scholar
[19. Jin, X., E. Keller, J. Rexfor d. Virtual Switching withouta Hypervisor fora More Secure Cloud. - In: Proc. of 2nd USENIX Work Hot Top Manag. Internet, Cloud, Enterp. Networks Serv. Hot-ICE’12, 2012, pp. 1-6.]Search in Google Scholar
[20. Kandula, S., D. Katabi, M. Jacob, A. Berger. Botz-4-Sale: Surviving Organized DDo S Attacks that Mimic Flash Crowds. - In: Proc. of 2nd Symp. Networked Syst. Des. Implement, 2005, pp. 287-300. http://dl.acm.org/citation.cfm?id=1251224]Search in Google Scholar
[21. Kaur, K., S. Vashisht. Data Separation Issues in Cloud Computing. - Int. J. Adv. Res. Eng. Technol., Vol. 1, 2013, No X, pp. 26-29.]Search in Google Scholar
[22. Keromytis, A., V. Misra, D. Rubenstein. SOS: Secure Overlay Services. - In: Proc. of SIGCOMM, ACM, 2002, pp. 61-72.]Search in Google Scholar
[23. Khan, A., N. Fisal, S. Hussai n. Man-in-the-Middle Attack and Possible Solutions on Wimax 802. - In: Proc. of 16j. Int. Conf. Recent Emerg. Adv. Technol. Eng. (i CREATE’09), 2009.]Search in Google Scholar
[24. Khor, S., A. Nakao. Daa S: DDo S Mitigation-as-a-Service. - In: Proc. of IEEE/IPSJ Int. Symp. Appl. Internet, IEEE, 2011 [Cited 6 November 2012], pp. 160-171. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=600414710.1109/SAINT.2011.30]Search in Google Scholar
[25. Kumar, M., P. Sujatha, V. Kalva, R. Nagori, A. Katukojwal a. Mitigating Economic Denial of Sustainability (EDo S) in Cloud Computing Using In-Cloud Scrubber Service. - In: Proc. of 4th Int. Conf. Comput. Intell. Commun. Networks., IEEE, 2012 [Cited 25 January 2017], pp. 535-539. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6375171]Search in Google Scholar
[26. Kuyoro, S., F. Ibikunle, O. Awodel e. Cloud Computing Security Issues and Challenges. - Int. J. Comput. Networks, Vol. 3, 2011, No 5, pp. 247-252.]Search in Google Scholar
[27. Lakshminar ayanan, K., D. Adkins, A. Perrig, I. Stoica. Taming IP Packet Flooding Attacks. - ACM SIGCOMM Comput. Commun. Rev., Vol. 34, 2004, No 1, pp. 45-50.10.1145/972374.972383]Search in Google Scholar
[28. Lin, C., C. Lee, J. Liu, C. Chen. A Detection Scheme for Flooding Attack on Application Layer Based on Semantic Concept. - IEEE, 2010, pp. 385-389.10.1109/COMPSYM.2010.5685483]Search in Google Scholar
[29. Lin, C.-H., J.-C. Liu, C.-C. Lien. Detection Method Based on Reverse Proxy Against Web Flooding Attacks. - In: Proc. of 8th Int. Conf. Intell. Syst. Des. Appl., IEEE, November 2008 [Cited 29 Jun 2016], pp. 281-284. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4696475]Search in Google Scholar
[30. Liu, W. Research on Do S Attack and Detection Programming. - In: Proc. of Third Int. Symp. Intell. Inf. Technol. Appl., IEEE, 2009 [Cited 29 March 2017], pp. 207-210. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5368799]Search in Google Scholar
[31. Mallikarjuna, B., P. Venkata Krishn a. OLB: A Nature Inspired Approach for Load Balancing in Cloud Computing. - Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp. 138-148.10.1515/cait-2015-0060]Search in Google Scholar
[32. Meier, J., A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla, M. A. Improving Web Application Security Threats and Countermeasures. - MSDN, 2003. http://msdn.microsoft.com/en-us/library/ff649874.aspx]Search in Google Scholar
[33. Mell, P., T. Grance. The NIST Definition of Cloud Computing. - National Institute of Standards and Technology, Vol. 53, 2009, No 6, 50 p. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc]Search in Google Scholar
[34. Morein, W., A. Stavrou, D. Cook, A. Keromytis, V. Misra, D. Rubenstein. Using Graphic Turing Tests to Counter Automated DDo S Attacks Against Web Servers. - In: Proc. of 10th ACM Conf. Comput. Commun. Secur. (CCS’03). USA, New York, ACM Press, 2003, p. 8. http://portal.acm.org/citation.cfm?doid=948109.94811410.1145/948109.948114]Search in Google Scholar
[35. Mukundrao, J., G. Vikram. Enhancing Security in Cloud Computing. - Inf. Knowl. Manag., Vol. 1, 2011, No 1, pp. 40-45. ]Search in Google Scholar
[36. Newman, R. Cybercrime, Identity Theft, and Fraud: Practicing Safe Internet - Network Security Threats and Vulnerabilities. - Int. J. Comput. Appl., ACM, Vol. 9, 2006, No 12, pp. 11-15.10.1145/1231047.1231064]Search in Google Scholar
[37. Osanaiye, O., K. Choo, M. Dlodlo. Distributed Denial of Service (DDo S) Resilience in Cloud: Review and Conceptual Cloud DDo S Mitigation Framework. - Journal of Network and Computer Applications, pp. 147-165.10.1016/j.jnca.2016.01.001]Search in Google Scholar
[38. Peng, T., C. Leckie, K. Ramamohanara o. Survey of Network-Based Defense Mechanisms Countering the Do Sand DDo S Problems. - ACM Computing Surveys, Vol. 39, 2007, No 1, pp. 1-42. 10.1145/1216370.1216373]Search in Google Scholar
[39. Piscitello, D. Anatomy ofa DNS DDo S Amplification Attack. 2011. http://www.watchguard.com/infocenter/editorial/41649.asp]Search in Google Scholar
[40. Raja, S., S. Ramaia h. CCDEA: Consumer and Cloud. - DEA Based Trust Assessment Model for the Adoption of Cloud Services, Vol. 16, 2016, No 3, pp. 52-69.10.1515/cait-2016-0034]Search in Google Scholar
[41. Raju, B., P. Swarna, M. Rao. Privacy and Security Issues of Cloud Computing. - Int. J., Vol. 1, 2011, No 2, pp. 128-136. ]Search in Google Scholar
[42. Ramgovind, S., M. Eloff, E. Smith. The Management of Security in Cloud Computing. - Inf. Secur., South Africa, IEEE, 2010, pp. 1-7. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=558829010.1109/ISSA.2010.5588290]Search in Google Scholar
[43. Rittinghouse, J. W., J. F. Ransom e. Cloud Computing: Implementation, Management, and Security. Boca Raton, CRC Press, 2010.]Search in Google Scholar
[44. Roberts, J., W. Al-Hamdan i. Who Can You Trust in the Cloud? - In: Proc. of Inf. Secur. Curric. Dev. Conf. (Info Sec CD’11), ACM Press, 2011, pp. 15-19. http://dl.acm.org/citation.cfm?id=2047456.204745810.1145/2047456.2047458]Search in Google Scholar
[45. Rouse, M. Virtualization Sprawl (VM Sprawl), 2004. http://whatis.techtarget.com/definition/virtualization-sprawl-virtual-server-sprawl]Search in Google Scholar
[46. Sabahi, F. Virtualization-Level Security in Cloud Computing. - Communication Software Networks, IEEE, 2011, pp. 250-254.10.1109/ICCSN.2011.6014716]Search in Google Scholar
[47. Sandar, V., S. Shenai. Economic Denial of Sustainability (EDo S) in Cloud Services Using HTTPand XML Based DDo S Attacks. - Int. J. Comput. Appl., Vol. 41, 31 March 2012, No 20, pp. 11-16. http://research.ijcaonline.org/volume41/number20/pxc3878063.pdf10.5120/5807-8063]Search in Google Scholar
[48. Sangroya, A., S. Kumar, J. Dhok, V. Varma. Towards Analyzing Data Security Risks in Cloud Computing Environments. - ICISTM, 2010, pp. 255-265.10.1007/978-3-642-12035-0_25]Search in Google Scholar
[49. Schwartz, M. New Virtualization Vulnerability Allows Escape to Hypervisor Attacks. 2012. http://www.darkreading.com/risk-management/new-virtualization-vulnerabilityallows-escape-to-hypervisor-attacks/d/d-id/1104823?]Search in Google Scholar
[50. Shynu, P., J. Singh. A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. - Cybernetics and Information Technologies, Vol. 16, 2016, No 1, pp. 19-38.10.1515/cait-2016-0002]Search in Google Scholar
[51. Sitaram, D., G. Manjunat h. Cloud Security Requirements and Best Practices. - Mov. to Cloud Dev. Apps. New World Cloud Comput., USA, Elsevier, 2012, p. 309.10.1016/B978-1-59749-725-1.00007-X]Search in Google Scholar
[52. Slack, E. How do You Know That“Delete” Means Delete in Cloud Storage? 2011 [Cited 14 April 2017]. http://www.storageswitzerland.com/Articles/Entries/2011/8/16_How_do_you_know_that_Delete_means_Delete_in_Cloud_Storage.html]Search in Google Scholar
[53. Somani, J., M. Gaur, D. Sanghi, M. Counti, R. Buyya. DDo S Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions. - DDo S Attacks in Cloud Computing. Vol. 107, pp. 30-48.10.1016/j.comcom.2017.03.010]Search in Google Scholar
[54. Sqalli, M., F. Al-Haidari, K. Salah. EDo S-Shield - A Two-Steps Mitigation Technique Against EDo S Attacks in Cloud Computing. - In: Proc. of 4th IEEE Int. Conf. Util. Cloud Comput., IEEE, 2011 [Cited 1 November 2016], pp. 49-56. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=612348010.1109/UCC.2011.17]Search in Google Scholar
[55. Steve, H. Cloud Computing Made Clear. - Bus Week, Vol. 59, 2008, No 1. ]Search in Google Scholar
[56. Trappler, T. When Your Data’s in the Cloud, Is It Still Your Data? Computer World. - Comput. World, 2012. http://www.computerworld.com/s/article/9223479/When_your_data_s_in_the_cloud_is_it_still_your_data_]Search in Google Scholar
[57. Vaidya, V. Virtualization Vulnerabilities and Threats : A Solution White Paper. - Red Cannon Secur. Inc., 2009 [Cited 13 April 2016], pp. 1-7. http://www.redcannon.com/vDefense/VM_security_wp.pdf]Search in Google Scholar
[58. Virtualizationadmin. What is VM Sprawl? 2008. http://www.virtualizationadmin.com/faq/vm-sprawl.html]Search in Google Scholar
[59. Wang, R., X. Sun, X. Yang, H. Hu. Cloud Computing and Extreme Learning Machine for a Distributed Energy Consumption Forecasting in Equipment-Manufacturing Enterprises. - Cybernetics and Information Technologies, Vol. 16, 2016, No 6, pp. 83-97.10.1515/cait-2016-0079]Search in Google Scholar
[60. Xie, Y., S. Yu. Monitoring the Application-Layer DDo S Attacks for IEEE. - ACM Trans Netw., Vol. 17, 2009, No 1, pp. 15-25.10.1109/TNET.2008.925628]Search in Google Scholar
[61. Yatagai, T., T. Isohara, I. Sasase. Detection of HTTP-GET Flood Attack Based on Analysis of Page Access Behavior. - In: Proc. of IEEE Pacific Rim Conf. Communication Computer Signal Process, IEEE, 2007, pp. 232-235.10.1109/PACRIM.2007.4313218]Search in Google Scholar
[62. Ying, L., B. Dong. The Algebraic Operations and Their Implementation Based ona Two-Layer Cloud Data Model, Vol. 16, 2016, No 6, pp. 5-26.10.1515/cait-2016-0074]Search in Google Scholar
[63. Zhou, M., R. Zhang, W. Xie, W. Qian, A. Zhou. Security and Privacy in Cloud Computing: A Survey. - In: Proc. of 6th Int. Conf. Semant. Knowl. Grids. IEEE, 2010, pp. 105-112. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5663489]Search in Google Scholar