Author:
Ashwitha A.,Banu M. Sheerin,Kaur Puneet
Publisher
Springer Science and Business Media LLC
Reference18 articles.
1. Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput Commun 107:30–48
2. Tupakula U, Varadharajan V, Akku N (2011) Intrusion detection techniques for infrastructure as a service cloud. In: 2011 IEEE ninth international conference on dependable, autonomic and secure computing, IEEE. pp 744–751
3. Wang G, Estrada ZJ, Pham C, Kalbarczyk Z, Iyer RK (2015) Hypervisor introspection: a technique for evading passive virtual machine monitoring. In: 9th USENIX workshop on offensive technologies (WOOT 15)
4. Thirumalairaj A, Jeyakarthic M (2020) Hybrid cuckoo search optimization based tuning scheme for deep neural network for intrusion detection systems in cloud environment. J Res Lepid 51(2):209–224
5. Sathiyadhas SS, Soosai Antony MCV (2022) A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network. Int J Adapt Control Signal Process 36(5):1060–1076
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献