S Purohit,
P Calyam,
S Wang… - … 2nd Conference on …, 2020 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, cryptojacking which threaten service availability. Recently, methods for threat …