2018 14th International Conference on Computational Intelligence and Security (CIS) 2018
DOI: 10.1109/cis2018.2018.00065
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Service Selection with Fuzzy C-Means Artificial Immune Network Memory Classifier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…The authors also analyzed the sensitivity of their results. The author in [12] also employed a hybrid method using artificial immune network and fuzzy theory for selection of CSs.…”
Section: B Rank Cloud Services Using Vikor Methodsmentioning
confidence: 99%
“…The authors also analyzed the sensitivity of their results. The author in [12] also employed a hybrid method using artificial immune network and fuzzy theory for selection of CSs.…”
Section: B Rank Cloud Services Using Vikor Methodsmentioning
confidence: 99%
“…Grandhi et al 25 propose a fuzzy decision making approach that considers predefined quality-of-service (QoS) attributes from industry experts to determine suitable Cloud instances for applications. Ha 26 proposes a fuzzy approach to recommend instances based on predefined QoS attributes and user constraints. Sohaib et al 27 propose a fuzzy approach to determine a Cloud service model (IaaS, SaaS, or PaaS) for e-commerce, with QoS attributes defined by an expert in cloud computing.…”
Section: Related Workmentioning
confidence: 99%
“…Whilst numerous bio-inspired techniques for resilient cloud computing and other distributed systems have been investigated [14]. These can involve architectural models similar to this work using cellbased models [15], networking approaches based upon the distributed processing capabilities of ant colonies [16], intrusion detection methods [17] or service orchestration methods [18] based upon artificial immune systems, alternatives to public key infrastructure based upon family genetics [19] and many more.…”
Section: Related Work / Motivationmentioning
confidence: 99%