Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review

CN Modi, K Acha - the Journal of Supercomputing, 2017 - Springer
Virtualization plays a vital role in the construction of cloud computing. However, various
vulnerabilities are existing in current virtualization implementations, and thus there are …

Deep learning based multi-channel intelligent attack detection for data security

F Jiang, Y Fu, BB Gupta, Y Liang, S Rho… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Deep learning methods, eg, convolutional neural networks (CNNs) and Recurrent Neural
Networks (RNNs), have achieved great success in image processing and natural language …

Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review

MM Ahsan, KD Gupta, AK Nag, S Poudyal… - IEEE …, 2020 - ieeexplore.ieee.org
Cloud computing gained much popularity in the recent past due to its many internet-based
services related to data, application, operating system, and eliminating the need for central …

Scalable intrusion detection with recurrent neural networks

LO Anyanwu, J Keengwe… - … Conference on Information …, 2010 - ieeexplore.ieee.org
The ever-growing use of the Internet comes with a surging escalation of communication and
data access. Most existing intrusion detection systems have assumed the one-size-fits-all …

Network intrusion detection using self-recurrent wavelet neural network with multidimensional radial wavelons

V Alarcon-Aquino, JM Ramirez-Cortes… - … technology and control, 2014 - itc.ktu.lt
In this paper we report a novel application-basedmodel as a suitable alternative for the
classification and identification ofattacks on a computer network, and thus guarantee its …

[PDF][PDF] Moving towards positive security model for web application firewall

AH Yaacob, NM Ahmad, NN Ahmad… - International Journal of …, 2012 - academia.edu
The proliferation of web application and the pervasiveness of mobile technology make web-
based attacks even more attractive and even easier to launch. Web Application Firewall …

[PDF][PDF] Elman-recurrent neural network for load shedding optimization

W Aribowo - Sinergi, 2020 - core.ac.uk
Load shedding plays a key part in the avoidance of the power system outage. The frequency
and voltage fluidity leads to the spread of a power system into sub-systems and leads to the …

[PDF][PDF] Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review

MAP MAHMUD - dro.deakin.edu.au
Cloud computing gained much popularity in the recent past due to its many internet-based
services related to data, application, operating system, and eliminating the need for central …