2023
DOI: 10.1007/978-981-19-7982-8_56
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Intrusion Detection System in Cloud Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…where, x (2) j is represented as the output of input layer that is given to invisible layer with the context layer, n is represents the nth iteration of malicious and non-malicious attack, 𝛼 is represented as the constant function with self-connecting feedback gain 0 ≤ 𝛼 ≤ 1 and this parameter is used to improve the accuracy. The final output layer equation is given in (12),…”
Section: • Hyb Eesccnn For Classification Processmentioning
confidence: 99%
See 2 more Smart Citations
“…where, x (2) j is represented as the output of input layer that is given to invisible layer with the context layer, n is represents the nth iteration of malicious and non-malicious attack, 𝛼 is represented as the constant function with self-connecting feedback gain 0 ≤ 𝛼 ≤ 1 and this parameter is used to improve the accuracy. The final output layer equation is given in (12),…”
Section: • Hyb Eesccnn For Classification Processmentioning
confidence: 99%
“…But the performance, like a battery's lifetime, computing resources scarcity and storage, can be limited due to the challenges of mobile devices. Stored data security is another fundamental problem in cloud and mobile computing 11‐13 . The Internet‐based next‐generation computing system is cloud computing which provides the user access to an easy and customizable service with different applications in the cloud.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation