A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Entropy Variation and J48 Algorithm based Intrusion Detection System for Cloud Computing
2014
International Journal of Computer Applications
Now Cloud Computing has achieved formidable impetus where IT infrastructures and applications are provided as service to end users. It provides shared pool of resources in addition with Data storage, computer processing power and specialized corporate and user applications. Users can access Cloud services any time anywhere and store large amount of data from anywhere, due to increases the popularity of Cloud computing there is risk of Security. Data which is stored on cloud may be vulnerable
doi:10.5120/18116-9350
fatcat:5ophaicm4reexfohu5ughycohu