Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights.
Mhamed ZineddinePublished in: Comput. Secur. (2015)
Keyphrases
- search algorithm
- information security
- security vulnerabilities
- countermeasures
- security issues
- security risks
- cloud computing
- optimization process
- search space
- security mechanisms
- optimization model
- optimization algorithm
- data hiding
- black and white
- optimization problems
- buffer overflow
- attack graphs
- branch and bound
- np hard
- attack scenarios