Related references
Note: Only part of the references are listed.Survey and taxonomy of information-centric vehicular networking security attacks
Mena Safwat et al.
AD HOC NETWORKS (2022)
A new intelligent multilayer framework for insider threat detection
Mohammed Nasser Al-Mhiqani et al.
COMPUTERS & ELECTRICAL ENGINEERING (2022)
Privacy-Preserving cloud-Aided broad learning system
Haiyang Liu et al.
COMPUTERS & SECURITY (2022)
Deep Learning for HDD Health Assessment: An Application Based on LSTM
Aniello De Santo et al.
IEEE TRANSACTIONS ON COMPUTERS (2022)
Reinforcement learning and its connections with neuroscience and psychology
Ajay Subramanian et al.
NEURAL NETWORKS (2022)
3D Shape Segmentation Using Soft Density Peak Clustering and Semi-Supervised Learning
Zhenyu Shu et al.
COMPUTER-AIDED DESIGN (2022)
Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions
Mohamed Amine Ferrag et al.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2022)
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
Mahdi R. Alagheband et al.
INTERNET OF THINGS (2022)
PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys
Xindi Ma et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning
Donghai Tian et al.
COMPUTER NETWORKS (2021)
Security and privacy-aware Artificial Intrusion Detection System using Federated Machine Learning
K. P. Sanal Kumar et al.
COMPUTERS & ELECTRICAL ENGINEERING (2021)
A Multi-Perspective malware detection approach through behavioral fusion of API call sequence
Eslam Amer et al.
COMPUTERS & SECURITY (2021)
Machine learning based deep job exploration and secure transactions in virtual private cloud systems
S. Rajasoundaran et al.
COMPUTERS & SECURITY (2021)
Privacy-preserving multikey computing framework for encrypted data in the cloud
Jun Zhang et al.
INFORMATION SCIENCES (2021)
Optimized extreme learning machine for detecting DDoS attacks in cloud computing
Gopal Singh Kushwah et al.
COMPUTERS & SECURITY (2021)
Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments
Tom Landman et al.
NEURAL NETWORKS (2021)
Malicious mining code detection based on ensemble learning in cloud computing environment
Shudong Li et al.
SIMULATION MODELLING PRACTICE AND THEORY (2021)
Computing Paradigms in Emerging Vehicular Environments: A Review
Lion Silva et al.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)
Task Scheduling for Multi-Cloud Computing Subject to Security and Reliability Constraints
Qing-Hua Zhu et al.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)
Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments
Tomer Panker et al.
KNOWLEDGE-BASED SYSTEMS (2021)
Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms
Salah T. Alshammari et al.
IEEE ACCESS (2021)
Machine learning approaches to IoT security: A systematic literature review
Rasheed Ahmad et al.
INTERNET OF THINGS (2021)
Machine Learning for Cloud Security: A Systematic Review
Ali Bou Nassif et al.
IEEE ACCESS (2021)
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Bader Alouffi et al.
IEEE ACCESS (2021)
A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing
Mahdi Rabbani et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
A survey on security challenges in cloud computing: issues, threats, and solutions
Hamed Tabrizchi et al.
JOURNAL OF SUPERCOMPUTING (2020)
Highly efficient federated learning with strong privacy preservation in cloud computing
Chen Fang et al.
COMPUTERS & SECURITY (2020)
Generalizing from a Few Examples: A Survey on Few-shot Learning
Yaqing Wang et al.
ACM COMPUTING SURVEYS (2020)
Voting extreme learning machine based distributed denial of service attack detection in cloud computing
Gopal Singh Kushwah et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)
A Review of Machine Learning Algorithms for Cloud Computing Security
Umer Ahmed Butt et al.
ELECTRONICS (2020)
Malware classification for the cloud via semi-supervised transfer learning
Xianwei Gao et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
Shahab Shamshirband et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)
Green Cloud Multimedia Networking: NFV/SDN Based Energy-Efficient Resource Allocation
Ahmadreza Montazerolghaem et al.
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2020)
CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection
Kurniabudi et al.
IEEE ACCESS (2020)
Design of network threat detection and classification based on machine learning on cloud computing
Hyunjoo Kim et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
A deep learning approach for proactive multi-cloud cooperative intrusion detection system
Adel Abusitta et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms
Zouhair Chiba et al.
COMPUTERS & SECURITY (2019)
A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks
Saurabh Dey et al.
INFORMATION FUSION (2019)
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
Hongyu Liu et al.
APPLIED SCIENCES-BASEL (2019)
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
Rakesh Kumar et al.
COMPUTER SCIENCE REVIEW (2019)
Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC
K. Vijayakumar et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory
Aviad Cohen et al.
EXPERT SYSTEMS WITH APPLICATIONS (2018)
A Domain Partition-Based Trust Model for Unreliable Clouds
PeiYun Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
John Patrick Barrowclough et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
An Introduction to Dew Computing: Definition, Concept and Implications
Partha Pratim Ray
IEEE ACCESS (2018)
Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning
George Loukas et al.
IEEE ACCESS (2018)
Identity and access management in cloud environment: Mechanisms and challenges
I. Indu et al.
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH (2018)
Security Enhancement in Healthcare Cloud using Machine Learning
Mbarek Marwan et al.
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017) (2018)
Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review
Chirag N. Modi et al.
JOURNAL OF SUPERCOMPUTING (2017)
Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning
Qingchen Zhang et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
A survey of security issues for cloud computing
Minhaj Ahmad Khan
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Secure and controllable k-NN query over encrypted cloud data with key confidentiality
Youwen Zhu et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2016)
Detection of known and unknown DDoS attacks using Artificial Neural Networks
Alan Saied et al.
NEUROCOMPUTING (2016)
A Study on Data Storage Security Issues in Cloud Computing
Naresh Vurukonda et al.
2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016 (2016)
Security in cloud computing: Opportunities and challenges
Mazhar Ali et al.
INFORMATION SCIENCES (2015)
Malware behavioural detection and vaccine development by using a support vector model classifier
Ping Wang et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2015)
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
Jiawei Yuan et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
An access control model for cloud computing
Younis A. Younis et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2014)
A Survey of Security Issues in Hardware Virtualization
Gabor Pek et al.
ACM COMPUTING SURVEYS (2013)
A novel intrusion severity analysis approach for Clouds
Junaid Arshad et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE (2013)
An intrusion detection and prevention system in cloud computing: A systematic review
Ahmed Patel et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
A survey of intrusion detection techniques in Cloud
Chirag Modi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
A survey on security issues and solutions at different layers of Cloud computing
Chirag Modi et al.
JOURNAL OF SUPERCOMPUTING (2013)
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
Md. Tanzim Khorshed et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2012)
Addressing cloud computing security issues
Dimitrios Zissis et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE (2012)
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
Rajkumar Buyya et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2009)
A hybrid machine learning approach to network anomaly detection
Taeshik Shon et al.
INFORMATION SCIENCES (2007)