Login / Signup
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency.
Sara Sutton
Benjamin Bond
Sementa Tahiri
Julian L. Rrushi
Published in:
TPS-ISA (2019)
Keyphrases
</>
resource utilization
load balancing
resource management
response time
high availability
quality of service
grid computing
artificial intelligence
video streaming
network resources
resource manager
management system
energy consumption
end to end
anomaly detection
virtual machine