Detecting and Mitigating Storm Attacks in Mobile Access to the Cloud.
Mihajlo PavloskiPublished in: ICFC (2019)
Keyphrases
- mobile environments
- mobile devices
- mobile computing environment
- network intrusion detection systems
- mobile internet
- access control
- cloud computing
- internet access
- internet services
- hand held devices
- intrusion detection system
- mobile phone
- mobile computing
- mobile clients
- context aware
- intrusion detection
- short term
- computing environments
- mobile users
- security mechanisms
- mobile applications
- misuse detection
- power consumption
- mobile learning
- detect malicious
- countermeasures
- detecting malicious
- network access
- unauthorized access
- personal digital assistants
- security threats
- wireless technologies
- watermarking algorithm
- smart phones
- anomaly detection
- sensor networks
- long term