Login / Signup
Detecting Suspicious File Migration or Replication in the Cloud.
Adam Bowers
Cong Liao
Douglas Steiert
Dan Lin
Anna Cinzia Squicciarini
Ali R. Hurson
Published in:
IEEE Trans. Dependable Secur. Comput. (2021)
Keyphrases
</>
database
data migration
cloud computing
distributed databases
peer to peer
file system
detect malicious
malware detection
anomaly detection
fault tolerance
data center
detecting malicious
virtual machine
b tree
fault tolerant
automatic detection
data structure
web pages
artificial intelligence
data mining
databases