Login / Signup
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification.
Ru Xie
Liming Wang
Xiaojie Tao
Published in:
MILCOM (2021)
Keyphrases
</>
behavior analysis
allocation strategy
anomaly detection
allocation strategies
intrusion detection
surveillance system
network traffic
bidding strategies
intrusion detection system
virtual machine