Related references
Note: Only part of the references are listed.Malware Detection in Cloud Infrastructures using Convolutional Neural Networks
Mahmoud Abdelsalam et al.
PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) (2018)
Attribute-Based Access Control
Vincent C. Hu et al.
COMPUTER (2015)
Path Conditions and Principal Matching: A New Approach to Access Control
Jason Crampton et al.
PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14) (2014)
Intrusion detection system: A comprehensive review
Hung-Jen Liao et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships
Yuan Cheng et al.
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012) (2012)
Social phishing
Tom N. Jagatic et al.
COMMUNICATIONS OF THE ACM (2007)