Intrusion detection techniques in cloud environment: A survey
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …
Researchers have provided a survey on several intrusion detection techniques for detecting …
DNS based infection scores
PK Manadhata - US Patent 10,474,820, 2019 - Google Patents
Abstract Systems and methods associated with domain name system (DNS) based infection
scores. One example method includes maintaining query profiles for members of a set of …
scores. One example method includes maintaining query profiles for members of a set of …
[PDF][PDF] Fuzzy automaton as a detection mechanism for the multi-step attack
The integration of a fuzzy system and automaton theory can form the concept of fuzzy
automaton. This integration allows a discretely defined state-machine to act on continuous …
automaton. This integration allows a discretely defined state-machine to act on continuous …
[PDF][PDF] Fuzzy Automaton-based Early Detection Model
M Almseidin - 2020 - 193.6.1.94
Nowadays, network administrators face stressful environments with an overload of network
traffics. Network traffic needs to be analyzed and investigated to detect abnormalities. The …
traffics. Network traffic needs to be analyzed and investigated to detect abnormalities. The …
[CITATION][C] Efficiient Techniques for Intrusion Detection in Cloud Environment...
P Mishra - 2017 - MNIT Jaipur