Malware test on cloud computing infrastructure
Author(s):
G.Komala
Keywords:
Malware, propagation, modelling, power law.
Abstract
This malware poses a serious threat to the network of Pervasive security, networks. However, they have to understand that malware debts are very limited in network behavior. In this paper, Investigate Propagates from the international perspective on how they are in malware networks. Structural problem and both come with epidemic layer network network Propagation malware of precise designs. Image based model and suggested that we are Indicates, Bali Resource Malware Analysis, Respectively Phase, so quickly distributed to the Distribution of Power Law with a small tail of Follows Distributed and Distributed, and Distribution of Electric Act. Extensive experiments have been confirmed by Performed Beans Have, and Thierry Findings Clock results through malware data set across two worlds in the real world.
Article Details
Unique Paper ID: 145309

Publication Volume & Issue: Volume 4, Issue 9

Page(s): 19 - 23
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews