[PDF][PDF] Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning.

H Kanaker, NA Karim, SAB Awwad… - International Journal of …, 2022 - academia.edu
Cloud computing technology is known as a distributed computing network, which consists of
a large number of servers connected via the internet. This technology involves many …

Ransomware: A rising threat of new age digital extortion

A Bhardwaj - Online banking security measures and data protection, 2017 - igi-global.com
Compared to the last five to six years, the massive scale by which innocent users are being
subjected to a new age threat in form of digital extortion has never been seen before. With …

A comparative study of machine learning tools for detecting Trojan horse infections in cloud computing environments.

H Kanaker, M Tarawneh, NA Karim… - … Journal of Electrical …, 2024 - search.ebscohost.com
Cloud computing offers several advantages, including cost savings and easy access to
resources, it is also could be vulnerable to serious security attacks such as cloud Trojan …

Web Attack Intrusion Detection System Using Machine Learning Techniques.

MK Baklizi, I Atoum, M Alkhazaleh… - … Journal of Online & …, 2024 - search.ebscohost.com
Web attacks often target web applications because they can be accessed over a network
and often have vulnerabilities. The success of an intrusion detection system (IDS) in …

A rule based probabilistic technique for malware code detection

S Chakraborty, L Dey - Multiagent and Grid Systems, 2016 - content.iospress.com
Security is one of the major concerns in generic computing system which is used in our day
to day life to deal with various aspects like education, banking, communication …

Detection of worms over cloud environment: a literature survey

M Thangavel, B Jeyapriya, KS Suriya - … Computing Technologies for …, 2018 - igi-global.com
In recent years, computer worms are the remarkable difficulties found in the distributed
computing. The location of worms turns out to be more unpredictable since they are …

[PDF][PDF] Prepublication Copy Malware Code Detection Technique for Generic Computer System

S Chakraborty, L Dey - researchgate.net
Security is one of the major concerns in generic computing which is used in our day to day
life to deal with various aspects like education, banking, communication, entertainment etc …

[引用][C] Ataque denial of service em redes Profinet: estudo de caso

AC Turcato, RA Flauzino, GS Sestito, AL Dias… - Anais, 2015 - repositorio.usp.br
ReP USP - Detalhe do registro: Ataque denial of service em redes Profinet: estudo de caso
Home About USP Schools USP Schools Escola de Artes, Ciências e Humanidades (EACH) …