Login / Signup
Cloud Protection by Obfuscation: Techniques and Metrics.
Muhammad Hataba
Ahmed El-Mahdy
Published in:
3PGCIC (2012)
Keyphrases
</>
cloud computing
reverse engineering
privacy protection
quality measures
control flow
static analysis
virtual machine
malware detection
database
similarity metrics
computing platform
evaluation metrics
information security
anomaly detection
search engine
data mining
real time