Login / Signup
An Invasion Detection System in the Cloud That Use Secure Hashing Techniques.
Sridevi Sakhamuri
Gopi Krishna Yanala
Varagani Durga Shyam Prasad
Ch. Bala Subrmanyam
Aika Pavan Kumar
Published in:
FICTA (2) (2023)
Keyphrases
</>
cloud computing
detection algorithm
false positives
detection rate
automatic detection
object detection
data structure
detection method
detection accuracy
data sets
similarity measure
video sequences
anomaly detection
virtual machine
false alarms
random projections