共 32 条
[1]
Ramkumar M.P., Daniya T., Paul P.M., Rajakumar S., Intrusion detection using optimized ensemble classification in fog computing paradigm, Knowl-Based Syst, 252, (2022)
[2]
Rabbani M., Wang Y.L., Khoshkangini R., Jelodar H., Zhao R., Hu P., A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing, J Netw Comput Appl, 151, (2020)
[3]
Lallie H.S., Shepherd L.A., Nurse J.R., Erola A., Epiphaniou G., Maple C., Bellekens X., Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic, Comput Secur, 105, (2021)
[4]
Aslan O., Ozkan-Okay M., Gupta D., Intelligent behavior-based malware detection system on cloud computing environment, IEEE Access, 9, pp. 83252-83271, (2021)
[5]
Roy S., Li J., Bai Y., A two-layer fog-cloud intrusion detection model for IoT networks, Internet Things, 19, (2022)
[6]
Al Saleh R., Driss M., Almomani I., CBiLSTM: a hybrid deep learning model for efficient reputation assessment of cloud services, IEEE Access, 10, pp. 35321-35335, (2022)
[7]
Arunkumar M., Ashok Kumar K., Malicious attack detection approach in cloud computing using machine learning techniques, Soft Comput, (2022)
[8]
Soumya K., Arunkumar M., SSD Implementation and Spark Integration, Information and Communication Technology for Intelligent Systems (ICTIS, 2017, 1, pp. 249-261, (2017)
[9]
Shamshirband S., Fathi M., Chronopoulos A.T., Montieri A., Palumbo F., Pescape A., Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues, J Inf Secur Appl, 55, (2020)
[10]
Mishra P., Gupta A., Aggarwal P., Pilli E.S., vServiceInspector: introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers, Ad Hoc Netw, 131, (2022)