Detecting fraudulent use of cloud resources.
Joseph IdziorekMark TannianDouglas JacobsonPublished in: CCSW (2011)
Keyphrases
- cloud computing
- computing resources
- resource constraints
- resource allocation
- limited resources
- cloud computing platform
- private cloud
- heterogeneous environments
- virtual machine
- web resources
- fraud detection
- resource management
- computing infrastructure
- service level agreements
- real time
- data center
- learning resources
- intrusion detection
- association rules
- multi agent
- information systems