Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration.
Tzung-Han JengWen-Yang LuoChuan-Chiang HuangChien-Chih ChenKuang-Hung ChangYi-Ming ChenPublished in: Int. J. Grid High Perform. Comput. (2021)
Keyphrases
- cloud computing
- traffic analysis
- network security
- computing resources
- data center
- service providers
- secure manner
- distributed computing
- big data
- middleware architecture
- cloud computing environment
- network traffic
- data management
- cloud storage
- cloud computing platform
- computing technologies
- traffic data
- information sharing
- internet traffic
- cloud platform
- business models
- computer networks
- metadata
- database
- grid computing
- database systems