Vallabapurapu et al., 2025 - Google Patents
PaaS Platform Security Enhancement and DOS Attack Detection In Cloud Computing and its Prevention.Vallabapurapu et al., 2025
- Document ID
- 9687725145334127357
- Author
- Vallabapurapu S
- Vankdothu R
- Publication year
- Publication venue
- Journal of Computational Analysis & Applications
External Links
Snippet
Assault identification systems encounter a confusing problem landscape because of the nonlinear nature of interference attempts, the unpredictable nature of framework traffic, and the vast number of attributes in the issue space. Based on a combination of the recurrent …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/629—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of extracted features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12388864B2 (en) | Cryptocurrency based malware and ransomware detection systems and methods | |
| Bai et al. | Membership inference attacks and defenses in federated learning: A survey | |
| Torre et al. | Toward enhancing privacy preservation of a federated learning cnn intrusion detection system in iot: Method and empirical study | |
| Madhavram et al. | AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance | |
| US9292695B1 (en) | System and method for cyber security analysis and human behavior prediction | |
| US10425429B2 (en) | System and method for cyber security analysis and human behavior prediction | |
| Sandhu et al. | Identification of malicious edge devices in fog computing environments | |
| Gylling et al. | Mapping cyber threat intelligence to probabilistic attack graphs | |
| US12219073B2 (en) | Proxy autonomous protocol for blockchain access control | |
| Rahdari et al. | A survey on privacy and security in distributed cloud computing: Exploring federated learning and beyond | |
| Aldini et al. | Logics to reason formally about trust computation and manipulation | |
| Fung et al. | Dancing in the dark: Private multi-party machine learning in an untrusted setting | |
| Shafique et al. | Machine learning empowered efficient intrusion detection framework | |
| Archer et al. | UN handbook on privacy-preserving computation techniques | |
| Maheswari et al. | A hybrid soft computing technique for intrusion detection in web and cloud environment | |
| Gattoju et al. | Design of ChaApache framework for securing Hadoop application in big data | |
| Sifat et al. | Android ransomware attacks detection with optimized ensemble learning | |
| Mariotti et al. | An extension of the advise meta modeling framework and its application for an early-stage security analysis of a public transport supervision system | |
| Nafi et al. | A new trusted and secured E-commerce architeture for cloud computing | |
| Vallabapurapu et al. | PaaS Platform Security Enhancement and DOS Attack Detection In Cloud Computing and its Prevention. | |
| Ennajjar et al. | Securing data in cloud computing by classification | |
| Ennajjar et al. | Using data taxonomy to achieve security in cloud computing | |
| Li et al. | Blockchain and deep learning technology for comprehensive improvement of transaction information quality | |
| Howes et al. | Enabling trustworthy spaces via orchestrated analytical security | |
| Mittal et al. | AI-Driven Real-Time API Security: Explainable Threat Detection for Cloud Environments |