Cloud computing improved clustering using intrusion detection
It is one of the more difficult tasks and calls for highly skilled specialists to deal with the
aspects and systems of action of intruders and then unauthorized users who attempt to …
aspects and systems of action of intruders and then unauthorized users who attempt to …
A secure framework for the cloud to protect the virtual machine from malicious events
P Neelakantan - Multimedia Tools and Applications, 2023 - Springer
Abstract In recent years, Virtual Machine (VM) has played an important role for cloud
computing applications to execute the assigned user tasks. However, the cloud is a big open …
computing applications to execute the assigned user tasks. However, the cloud is a big open …
MAD-Malicious Activity Detection Framework in Federated Cloud Computing
In federation of cloud, multiple cloud service providers share their resources based on
certain assumptions and trust. Most of the times, identity of a user and permission to give …
certain assumptions and trust. Most of the times, identity of a user and permission to give …