Login / Signup

A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification.

Ru XieLiming WangXiaojie Tao
Published in: MILCOM (2021)
Keyphrases
  • behavior analysis
  • allocation strategy
  • anomaly detection
  • allocation strategies
  • intrusion detection
  • surveillance system
  • network traffic
  • bidding strategies
  • intrusion detection system
  • virtual machine