Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach.
Abhishek AgarwalAyush PrasadRishabh RustogiSweta MishraPublished in: J. Inf. Secur. Appl. (2021)
Keyphrases
- deep learning
- resource consumption
- unsupervised learning
- object detection
- machine learning
- resource allocation
- weakly supervised
- anomaly detection
- optimal solution
- data transfer
- unsupervised feature learning
- neural network
- processing times
- solution quality
- object categories
- scheduling algorithm
- wireless sensor networks