2017
DOI: 10.1007/978-3-319-55589-8_4
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of the State-of-the-Art of Cloud Computing Cyber-Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Vasan et al [19] proposed an MC method based on combining two models of deep CNN, GoogleNet, and ResNet models. Bennasar et al [20] proposed an MC method based on combining three models of deep CNN, AlexNet, VGG, GoogleNet, and ResNet. Jeyaprakash et al [2] proposed an MC method based on DenseNet model.…”
Section: Related Workmentioning
confidence: 99%
“…Vasan et al [19] proposed an MC method based on combining two models of deep CNN, GoogleNet, and ResNet models. Bennasar et al [20] proposed an MC method based on combining three models of deep CNN, AlexNet, VGG, GoogleNet, and ResNet. Jeyaprakash et al [2] proposed an MC method based on DenseNet model.…”
Section: Related Workmentioning
confidence: 99%
“…For the Internet of Things (IoT) security, risks and threats may occur on devices connected to the Internet in uncertain situations [ 4 , 5 ]. Moreover, cloud computing systems can be threatened from intruders in terms of the vulnerability of data integrity, authentication, and denial of service [ 6 , 7 ]. Therefore, recent security issues of machine learning systems led to complications in several real-life applications such as network traffic analysis, fraud detection, spam filtering, intrusion detection, phishing detection, ransomware detection, and malware classification [ 8 – 13 ].…”
Section: Introductionmentioning
confidence: 99%