Author:
Dhawan Vaneeta,Rani Sangeeta,Joshi Lalit Kumar
Reference19 articles.
1. P. Mell and T. Grance, "Definition of cloud computing" available at http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf
2. Intrusion detection for network based cloud computing by custom RC-NN and optimization
3. Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN
4. J. Snehi, A. Bhandari, V. Baggan and M. Snehi, Int. J. Rece. Tech. Engi. 9, 44–49 (2021).
5. M. A. Hatef, V. Shaker, M. R. Jabbarpour, J. Jung and H. Zarrabi, Conc. Comp. Prac. Expe. 30,1–10 (2018).