[PDF][PDF] Hybrid Multi-Objective Deep Learning Model for Anomaly Detection in Cloud Computing Environment
RR Palle - International Journal of Scientific Research in Science …, 2015 - academia.edu
Cloud computing environments play a pivotal role in the IT landscape, seamlessly integrated
into the fabric of organizations and individuals' daily activities. Despite the myriad …
into the fabric of organizations and individuals' daily activities. Despite the myriad …
RADS: Real-time anomaly detection system for cloud data centres
Cybersecurity attacks in Cloud data centres are increasing alongside the growth of the
Cloud services market. Existing research proposes a number of anomaly detection systems …
Cloud services market. Existing research proposes a number of anomaly detection systems …
Advancing anomaly detection in cloud environments with cutting‐edge generative AI for expert systems
U Demirbaga - Expert Systems, 2024 - Wiley Online Library
As artificial intelligence (AI) continues to advance, Generative AI emerges as a
transformative force, capable of generating novel content and revolutionizing anomaly …
transformative force, capable of generating novel content and revolutionizing anomaly …
Predicting cloud-native application failures based on monitoring data of cloud infrastructure
The quality of service provided by cloud-deployed online applications is often affected by
faults in the underlying cloud platform and infrastructure. In order to discover the cause and …
faults in the underlying cloud platform and infrastructure. In order to discover the cause and …
AutoMigrate: a framework for developing intelligent, self-managing cloud services with maximum availability
Cloud services are on-demand services provided to end-users over the Internet and hosted
by cloud service providers. A cloud service consists of a set of interacting applications …
by cloud service providers. A cloud service consists of a set of interacting applications …
Secure cloud computing: Reference architecture for measuring instrument under legal control
A Oppermann, FG Toro, F Thiel… - Security and …, 2018 - Wiley Online Library
In Europe, measuring instruments under legal control are responsible for an annual turnover
of 500 billion Euros and contribute a significant part to the economy including establishing …
of 500 billion Euros and contribute a significant part to the economy including establishing …
[PDF][PDF] Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology.
Securing Computer Systems against all kind of threats is an impossible challenge to fulfill.
Although, in the field of Legal Metrology, it shall be assured that one can rely on the …
Although, in the field of Legal Metrology, it shall be assured that one can rely on the …
Linear Regression Based DDoS Attack Detection
S Barbhuiya, P Kilpatrick… - Proceedings of the 2021 …, 2021 - dl.acm.org
DDoS attacks are increasing alongside the growth of web-based services. Existing research
proposes a number of anomaly-based techniques which analyse network traffic to detect …
proposes a number of anomaly-based techniques which analyse network traffic to detect …
HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural Networks
L Xu, X Lin, J Li, M Bai, L Wang - 2023 IEEE 22nd International …, 2023 - ieeexplore.ieee.org
A multi-step targeted cyberattack refers to a sophisticated, systematic, and persistent form of
attack aiming to compromise the security and integrity of a complex network system. These …
attack aiming to compromise the security and integrity of a complex network system. These …
DMFD: Non-Intrusive Dependency Inference and Flow Ratio Model for Performance Anomaly Detection in Multi-Tier Cloud Applications
More and more complex applications are deployed in virtualized Cloud environments. Cloud
applications usually consist of multiple virtual components and the data flow among these …
applications usually consist of multiple virtual components and the data flow among these …