International Conference of Numerical Analysis and Applied Mathematics Icnaam 2019 2020
DOI: 10.1063/5.0027355
|View full text |Cite
|
Sign up to set email alerts
|

An advanced classification of cloud computing security techniques: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In view of the above new cloud security threats, how to ensure the information security of the cloud environment is an urgent problem to be solved under the current situation. Trough the analysis and research on the security of a cloud computing environment, it is found that the establishment of an intrusion detection system in a cloud computing environment can well protect the security of the cloud computing platform [6,7]. Intrusion detection system is a core technical means of dynamic network security protection at present [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In view of the above new cloud security threats, how to ensure the information security of the cloud environment is an urgent problem to be solved under the current situation. Trough the analysis and research on the security of a cloud computing environment, it is found that the establishment of an intrusion detection system in a cloud computing environment can well protect the security of the cloud computing platform [6,7]. Intrusion detection system is a core technical means of dynamic network security protection at present [8].…”
Section: Introductionmentioning
confidence: 99%
“…Initialize the population size to G, and set the maximum number of iterations to 1000. Calculate E according to formula(6) Encode the particles according to Fig.…”
mentioning
confidence: 99%