|
[1] “DDoS attacks in Q1 2019” May 2019, https://securelist.com/ddos-report-q1-2019/90792/ (Accessed on 7/22/2019) [2] Manos Antonakakis, Tim April, Michael Bailey, Matthew Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou., “Understanding the Mirai Botnet,” In Proc. 26th USENIX Security Symposium, Aug 2017. [3] Hsu et al., “Method for live migrating virtual machine,” February 20, 2018, http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PTXT&s1=9898319&OS=9898319&RS=9898319 (Accessed on 7/22/2019) [4] C. Clark, K. F., S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, A. Warfield., “Live Migration of Virtual Machines,” NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation, vol. 2, pp.273-286, May 2005. [5] ZhiYao Zhong, “Handover: A Mechanism to Improve the Availability of Network Services after Live Migration under Private Networks,” National Central University, Master's degree, Jun 2016.
|