Author:
Jayaweera M. P. G. K.,Kithulwatta W. M. C. J. T.,Rathnayaka R. M. K. T.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference40 articles.
1. Bo Wang, Q., Hua, H., Zhang, X., Tan: Yahui Nan,Rui Chen, Xinfeng Shu, Research on anomaly detection and real-time reliability evaluation with the log of cloud platform. Alexandria Eng. J. (2022). https://doi.org/10.1016/j.aej.2021.12.061. https://www.sciencedirect.com/science/article/pii/S1110016821008711
2. Stallings, W., Brown, L.: Computer Security: Principles and Practice. Pearson, Harlow, United Kingdom (2019)
3. Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., Ayaz, M.: “A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,“ in IEEE Access, vol. 9, pp. 57792–57807 (2021). https://doi.org/10.1109/ACCESS.2021.3073203
4. Check Point Software Technology:. Cyber Security Report. Accessed: 2019. [Online]. Available: (2019). https://pages.checkpoint.com/cybersecurity-report-2019.html
5. Elsayed, M.A., Zulkernine, M.: “PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction,“ in IEEE Access, vol. 8, pp. 45184–45197 (2020). https://doi.org/10.1109/ACCESS.2020.2977325