Intrusion detection techniques for mobile cloud computing in heterogeneous 5G.
Keke GaiMeikang QiuLixin TaoYongxin ZhuPublished in: Secur. Commun. Networks (2016)
Keyphrases
- intrusion detection
- cloud computing
- middleware architecture
- intrusion detection system
- computing resources
- internet services
- data center
- network intrusion detection
- anomaly detection
- mobile devices
- big data
- cloud computing environment
- service providers
- data management
- network traffic
- network security
- mobile computing
- cloud computing platform
- business models
- information security
- security issues
- data mining
- detecting anomalous
- mobile users
- mobile learning
- cyber security
- computer security
- wireless networks
- mobile phone
- context aware
- mobile networks
- mobile applications
- data mining techniques
- computer networks
- knowledge discovery
- computing environments