The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1007/978-981-16-6890-6_23
|View full text |Cite
|
Sign up to set email alerts
|

MACI: Malicious API Call Identifier Model to Secure the Host Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Security permits the classification, respectability, and accessibility of data. The improvement of advancements and their institutionalization makes accessible an arrangement of calculations and conventions for reacting to these issues [53]. There are two categories of Cryptography, Symmetric-key encryption, is a kind of algorithm that employs the same key to apply cryptography in both the operations, encrypting and decrypting the data whereas asymmetric encryption algorithm (encryption based on public key) employs distinct keys, one key which is public, used for encrypting the data and another key which is kept private, used for decrypting the data.…”
Section: Securitymentioning
confidence: 99%
“…Security permits the classification, respectability, and accessibility of data. The improvement of advancements and their institutionalization makes accessible an arrangement of calculations and conventions for reacting to these issues [53]. There are two categories of Cryptography, Symmetric-key encryption, is a kind of algorithm that employs the same key to apply cryptography in both the operations, encrypting and decrypting the data whereas asymmetric encryption algorithm (encryption based on public key) employs distinct keys, one key which is public, used for encrypting the data and another key which is kept private, used for decrypting the data.…”
Section: Securitymentioning
confidence: 99%
“…Cloud computing basically refers to a computing paradigm that provides on-demand access to a shared pool of resources, such as servers, sample systems provisioning, administration and applications in a convenient and organized manner, with minimal administrative effort [24,25]. It can be rapidly deployed and offloaded with cloud computing is commonly referred to as requirements delivery [26,27].…”
Section: Cloud Computingmentioning
confidence: 99%
“…Cloud computing basically refers to a computing paradigm that provides on-demand access to a shared pool of resources, such as servers, sample systems provisioning, administration and applications in a convenient and organized manner, with minimal administrative effort [24,25]. It can be rapidly deployed and offloaded with cloud computing is commonly referred to as requirements delivery [26,27].…”
Section: Cloud Computingmentioning
confidence: 99%