Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level

A worm is known as a malicious code that can replicate, infect and propagate itself without attaching itself to any host. Unlike other malicious codes, such as a Trojan horse and a virus, a worm can cause serious damage due to its payload and interrupt or stop cloud resources and services which then...

Full description

Saved in:
Bibliographic Details
Main Author: Hasan Mahmoud Sha'ban Kanaker
Format: Thesis
Language:en_US
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/ab042018-3c20-4cf1-9bb4-626532f08e2b/download
https://oarep.usim.edu.my/bitstreams/d2beb3a1-6eef-4d81-8fa7-61a4fb8109ad/download
https://oarep.usim.edu.my/bitstreams/e8d18f68-bf43-4815-ba20-bf90bba00187/download
https://oarep.usim.edu.my/bitstreams/270a3ae6-308b-47f4-bea3-5faa4b42a2bd/download
https://oarep.usim.edu.my/bitstreams/a5b3dc65-7a3f-426f-9b3e-5c41489fadba/download
https://oarep.usim.edu.my/bitstreams/5b675ce7-5d9c-4dc5-a431-b4dbbf80f655/download
https://oarep.usim.edu.my/bitstreams/dc02cd05-a716-4e4e-8d67-741ed4f01b14/download
https://oarep.usim.edu.my/bitstreams/3bfbea43-e471-4264-b378-5a8ef0be0100/download
https://oarep.usim.edu.my/bitstreams/b9ec0d06-751c-4aff-a98b-91e115145e47/download
https://oarep.usim.edu.my/bitstreams/3b3a3104-edc6-4b62-ac7c-bfc258e0c126/download
https://oarep.usim.edu.my/bitstreams/ea0b698d-c836-4156-ade3-b36e5143da73/download
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items