Author:
Velliangiri S.,Pandey Hari Mohan
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference27 articles.
1. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm;Hajimirzaei;ICT Express,2018
2. A view of cloud computing;Josep;Commun. ACM,2010
3. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing;Osanaiye;EURASIP J. Wireless Commun. Networking,2016
4. S. Hiremath, S. Kunte, A novel data auditing approach to achieve data privacy and data integrity in cloud computing, in: IEEE International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2017, pp. 306–310.
5. Mchain: A blockchain-based VM measurements secure storage approach in IaaS cloud with enhanced integrity and controllability;Zhao;IEEE Access,2018
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献