Detecting impersonation attacks in cloud computing environments using a centric user profiling approach.
Hisham A. KholidyPublished in: Future Gener. Comput. Syst. (2021)
Keyphrases
- computing environments
- user profiling
- computing platform
- web usage mining
- user profiles
- information filtering
- smart card
- cloud computing
- recommender systems
- mobile agents
- machine learning
- user interests
- information overload
- end users
- web mining
- personalized recommendation
- search engine
- security analysis
- user preferences
- web search
- data mining