Skip to main content
Log in

Recent trends on high-performance computing and security

  • Preface
  • Published:
Cluster Computing Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: DDoS tolerant networks. In: IEEE International Conference on DARPA Information Survivability Conference and Exposition (DISCEX2003), pp. 73–75 (2003)

    Chapter  Google Scholar 

  2. Wu, Y.C., Tseng, H.R., Yang, W., Jan, R.H.: DDoS detection and traceback with decision tree and grey relational analysis. In: IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE2008), pp. 306–314 (2009)

    Chapter  Google Scholar 

  3. Cabrera, J.B.D., Lewis, L., Qin, X., Gutierrez, C., Lee, W., Mehra, R.K.: Proactive intrusion detection and SNMP based security management. In: Proceedings of IFIP/IEEE Eighth International Symposium on Integrated Net Work Management, pp. 225–254 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong-Hun Kim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kim, JH., Ryu, JK. Recent trends on high-performance computing and security. Cluster Comput 16, 207–208 (2013). https://doi.org/10.1007/s10586-013-0271-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-013-0271-x

Navigation