[go: up one dir, main page]

Vallabapurapu et al., 2025 - Google Patents

PaaS Platform Security Enhancement and DOS Attack Detection In Cloud Computing and its Prevention.

Vallabapurapu et al., 2025

Document ID
9687725145334127357
Author
Vallabapurapu S
Vankdothu R
Publication year
Publication venue
Journal of Computational Analysis & Applications

External Links

Snippet

Assault identification systems encounter a confusing problem landscape because of the nonlinear nature of interference attempts, the unpredictable nature of framework traffic, and the vast number of attributes in the issue space. Based on a combination of the recurrent …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6288Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
    • G06K9/629Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of extracted features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/68Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
US12388864B2 (en) Cryptocurrency based malware and ransomware detection systems and methods
Bai et al. Membership inference attacks and defenses in federated learning: A survey
Torre et al. Toward enhancing privacy preservation of a federated learning cnn intrusion detection system in iot: Method and empirical study
Madhavram et al. AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance
US9292695B1 (en) System and method for cyber security analysis and human behavior prediction
US10425429B2 (en) System and method for cyber security analysis and human behavior prediction
Sandhu et al. Identification of malicious edge devices in fog computing environments
Gylling et al. Mapping cyber threat intelligence to probabilistic attack graphs
US12219073B2 (en) Proxy autonomous protocol for blockchain access control
Rahdari et al. A survey on privacy and security in distributed cloud computing: Exploring federated learning and beyond
Aldini et al. Logics to reason formally about trust computation and manipulation
Fung et al. Dancing in the dark: Private multi-party machine learning in an untrusted setting
Shafique et al. Machine learning empowered efficient intrusion detection framework
Archer et al. UN handbook on privacy-preserving computation techniques
Maheswari et al. A hybrid soft computing technique for intrusion detection in web and cloud environment
Gattoju et al. Design of ChaApache framework for securing Hadoop application in big data
Sifat et al. Android ransomware attacks detection with optimized ensemble learning
Mariotti et al. An extension of the advise meta modeling framework and its application for an early-stage security analysis of a public transport supervision system
Nafi et al. A new trusted and secured E-commerce architeture for cloud computing
Vallabapurapu et al. PaaS Platform Security Enhancement and DOS Attack Detection In Cloud Computing and its Prevention.
Ennajjar et al. Securing data in cloud computing by classification
Ennajjar et al. Using data taxonomy to achieve security in cloud computing
Li et al. Blockchain and deep learning technology for comprehensive improvement of transaction information quality
Howes et al. Enabling trustworthy spaces via orchestrated analytical security
Mittal et al. AI-Driven Real-Time API Security: Explainable Threat Detection for Cloud Environments