2020
DOI: 10.1007/s12652-020-01916-0
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: A novel centralized cloud information accountability integrity with ensemble neural network based attack detection approach for cloud data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…In other words, all inclusive experimentation and trustworthy results need joint consideration. [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15] emphases only on basic attacks where data is processed with low security features. Even many methods does not incorporate learning techniques for avoiding attacks from external users.…”
Section: Research Gap and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…In other words, all inclusive experimentation and trustworthy results need joint consideration. [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15] emphases only on basic attacks where data is processed with low security features. Even many methods does not incorporate learning techniques for avoiding attacks from external users.…”
Section: Research Gap and Motivationmentioning
confidence: 99%
“…IDS are disseminated IDS because it use hypervisors to identify network hosts and disseminate the results. To investigate DDoS attacks in the cloud, machine learning is used to the NSL-KDD dataset [5]. The attributes chosen by both LVQ and PCA attribute selection approaches are essential for a successful implementation of mining algorithms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The residual network used the residual block that allows the forward pass via a network is given in Equation (32).…”
Section: 46mentioning
confidence: 99%
“…Cloud infrastructure includes many physical servers, which host many services and then run a number of virtual instances and manage cloud services 32 . The number of physical servers can be denoted as italicHi$$ Hi $$, where, italicHi,i=1,2,,n$$ Hi,i=1,2,\dots, n $$.…”
Section: Proposed Ddos Attack Detection In Cloud Using Ensemble Model...mentioning
confidence: 99%