2019
DOI: 10.1504/ijguc.2019.10022139
|View full text |Cite
|
Sign up to set email alerts
|

A review on intrusion detection approaches in cloud security systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Generally, there are the following two methods: (1) Improve the algorithm. Solve the problems caused by sample imbalance from the algorithm level, such as introducing sensitive cost function into the algorithm; (2) Solve from the data level. Tat is, before training the model, adjust the distribution of data samples in the training set.…”
Section: Design Of Data Acquisition Modulementioning
confidence: 99%
See 1 more Smart Citation
“…Generally, there are the following two methods: (1) Improve the algorithm. Solve the problems caused by sample imbalance from the algorithm level, such as introducing sensitive cost function into the algorithm; (2) Solve from the data level. Tat is, before training the model, adjust the distribution of data samples in the training set.…”
Section: Design Of Data Acquisition Modulementioning
confidence: 99%
“…With the continuous development of network technology, cloud computing has become a pillar technology of Internet applications in various felds [1,2]. However, the universality of cloud computing applications and their virtualization, isomerization, dynamic complexity, and other characteristics also lead to the cloud computing platform becoming the target of many hacker attacks, and the complex structure of the cloud computing platform also makes it face many security threats [3].…”
Section: Introductionmentioning
confidence: 99%