How to Attack and Congest Delay-Sensitive Applications on the Cloud | IEEE Conference Publication | IEEE Xplore