Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
A worm is known as a malicious code that can replicate, infect and propagate itself without attaching itself to any host. Unlike other malicious codes, such as a Trojan horse and a virus, a worm can cause serious damage due to its payload and interrupt or stop cloud resources and services which then...
Saved in:
Similar Items
-
Combating fraud and theft threats at host level using intrusion prevention system /
by: Murugan Thangavelu
Published: (2009) -
The role of threat perception and Japan's military buildup /
by: Noor Hilmi Mohd Johan
Published: (2016) -
Automated statistical based worm discovery using packet frequency burst detection /
by: Ahmad Helmi Mohd. Isa
Published: (2009) -
Shoulder surfing security threat prevention using shifting directions /
by: Tey, Boon Hau
Published: (2018) -
A port knocking authentication method for mobile cloud computing /
by: Jazi, Laleh Boroumand
Published: (2014)