A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Vulnerable Paths Assessment in Cloud for DDoS Attacks
2018
Americas Conference on Information Systems
Cloud computing is a subscription-based technology which provides services to its users on demand basis. Companies are migrating towards cloud at a fast pace because it is based on 'pay-as-you-go' model. In cloud computing, resource management and maintenance are done by the Cloud Service Provider (CSP), and users can access these services from anywhere at any time through the internet. Unfortunately, with all these benefits, cloud computing is also prone to various security threats. These
dblp:conf/amcis/TripathiM18
fatcat:ucxljhvhufgdtoaulrfuytbz4e