共 31 条
- [1] Jain K., Gupta M., Abraham A., A review on privacy and security assessment of cloud computing, J Inf Assur Secur, 16, pp. 161-168, (2021)
- [2] Buyya R., Srirama S.N., Casale G., Calheiros R., Simmhan Y., Varghese B., Shen H., A manifesto for future generation cloud computing: research directions for the next decade, ACM comput surv (CSUR), 51, 5, pp. 1-38, (2018)
- [3] Kantheti S.C., Manne R., Performance and evaluation of firewalls and security, An interdisciplinary approach to modern network security, pp. 69-87, (2022)
- [4] Lahmar F., Mezni H., Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA, Soft Comput, 25, 7, pp. 5173-5197, (2021)
- [5] Singh S., Intrusion detection system (IDS) and intrusion prevention system (IPS) for network security: a critical analysis, Intl J Resin Eng Appl Sci, 3, 3, pp. 1-9, (2013)
- [6] Hassan M.M., Gumaei A., Alsanad A., Alrubaian M., Fortino G., A hybrid deep learning model for efficient intrusion detection in big data environment, Inf Sci, 513, pp. 386-396, (2020)
- [7] Chen S., Xue M., Fan L., Hao S., Xu L., Zhu H., Li B., Automated poisoning attacks and defenses in malware detection systems: an adversarial machine learning approach, Comput Secur, 73, pp. 326-344, (2018)
- [8] Raghuvanshi K.K., Agarwal A., Jain K., Singh V.B., A time-variant fault detection software reliability model, SN Appl Sci, 3, pp. 1-10, (2021)
- [9] Jain K., Singh A., Singh P., Yadav S., An improved supervised classification algorithm in healthcare diagnostics for predicting opioid habit disorder, Intl J Reliab Qual E-Healthc (IJRQEH), 11, 1, pp. 1-16, (2022)
- [10] Jain K., Singh A., A two vector data-prediction model for energy-efficient data aggregation in wireless sensor network, Concurrency Comput: Pract Exp, 34, 11, (2022)