Author:
Prasad Vivek Kumar,Chudasama Vipul,Mewada Akshay,Bhavsar Madhuri,Shah Asheesh
Publisher
Springer Nature Singapore
Reference12 articles.
1. Prasad, V. K., Bhavsar, M. D., & Tanwar, S. (2019). Influence of montoring: Fog andedge computing. Scalable Computing: Practice and Experience, 20(2), 365–376.
2. Choi, Y., Kim, Y., & Rhu, M. (2021). Lazy batching: An SLA-aware batching system for cloud machine learning inference. In 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA) (p. 493506). IEEE. https://doi.org/10.10007/1234567890
3. Prasad, V. K., Shah, M., Patel, N., & Bhavsar, M. (2018). Inspection of trust basedcloud using security and capacity management at an IaaS level. Procedia Computer Science, 132, 1280–1289.
4. Home page: Cyber security statistics https://purplesec.us/resources/cybersecurity-statistics/.Last. Accessed 4 Septe 2021
5. Mthunzi, S. N., Benkhelifa, E., Bosakowski, T., Guegan, C. G., & Barhamgi, M. (2020) Cloud computing security taxonomy: From an atomistic to a holistic view. Future Generation Computer Systems, 107(2020), 620–644.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders;Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security;2023