Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Prevention of Runtime Malware Injection Attack in Cloud Using Unsupervised Learning

    M. Prabhavathy1,*, S. UmaMaheswari2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 101-114, 2022, DOI:10.32604/iasc.2022.018257

    Abstract Cloud computing utilizes various Internet-based technologies to enhance the Internet user experience. Cloud systems are on the rise, as this technology has completely revolutionized the digital industry. Currently, many users rely on cloud-based solutions to acquire business information and knowledge. As a result, cloud computing services such as SaaS and PaaS store a warehouse of sensitive and valuable information, which has turned the cloud systems into the obvious target for many malware creators and hackers. These malicious attackers attempt to gain illegal access to a myriad of valuable information such as user personal information, password, credit/debit card numbers, etc., from… More >

Displaying 1-10 on page 1 of 1. Per Page