An APT Trojans Detection Method for Cloud Computing Based on Memory Analysis and FCM

被引:0
|
作者
Ge, Liang [1 ]
Wang, Lianhai [1 ]
Xu, Lijuan [1 ]
机构
[1] 1Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center(National Supercomputer Center in Jinan), Jinan,250014, China
关键词
722.4 Digital Computers and Systems - 723 Computer Software; Data Handling and Applications;
D O I
7726145
中图分类号
学科分类号
摘要
12
引用
收藏
页码:179 / 183
相关论文
共 50 条
  • [21] Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
    Dhiyanesh, B.
    Karthick, K.
    Radha, R.
    Venaik, Anita
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1099 - 1107
  • [22] A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
    Wang, Xingzhu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [23] Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing
    Kwon, Hyukmin
    Kim, Taesu
    Yu, Song Jin
    Kim, Huy Kang
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2011, PT II, 2011, 6592 : 353 - 362
  • [24] Anomaly detection method of power dispatching data based on cloud computing platform
    Jie, Lu
    Liu Xiangxiang
    Li Haoxiang
    2020 INTERNATIONAL CONFERENCE ON BIG DATA & ARTIFICIAL INTELLIGENCE & SOFTWARE ENGINEERING (ICBASE 2020), 2020, : 23 - 26
  • [25] Analysis of Memory Management Policies for Heterogeneous Cloud Computing
    Son, Dong Oh
    Choi, Hong Jun
    Park, Jae Hyung
    Hong, Cheol
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [26] Classification of Volcanic Ash Cloud Based on Sensitivity Analysis and FCM
    Liu, Lan
    Li, Chengfan
    Lei, Yongmei
    Zhao, Junjuan
    Yin, Jingyuan
    Yuan, Yuan
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1017 - 1020
  • [27] Intrusion Detection Techniques Analysis in Cloud Computing
    Qi, Wuqi
    Wu, Wei
    Wang, Hao
    Ou, Lu
    Hu, Ning
    Tian, Zhihong
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 360 - 363
  • [28] Effective analysis of malware detection in cloud computing
    Yadav, Ram Mahesh
    COMPUTERS & SECURITY, 2019, 83 : 14 - 21
  • [29] A parallel computing method to electromagnetic problems based on cloud computing
    Niu, Pingjuan (niupingjuan@tjpu.edu.cn), 1600, China Machine Press (31):
  • [30] The Method and Tool of Cost Analysis for Cloud Computing
    Li, Xinhui
    Li, Ying
    Liu, Tiancheng
    Qiu, Jie
    Wang, Fengchun
    CLOUD: 2009 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2009, : 93 - 100