Malware test on cloud computing infrastructure
Author(s):
G.Komala
Keywords:
Malware, propagation, modelling, power law.
Abstract
This malware poses a serious threat to the network of Pervasive security, networks. However, they have to understand that malware debts are very limited in network behavior. In this paper, Investigate Propagates from the international perspective on how they are in malware networks. Structural problem and both come with epidemic layer network network Propagation malware of precise designs. Image based model and suggested that we are Indicates, Bali Resource Malware Analysis, Respectively Phase, so quickly distributed to the Distribution of Power Law with a small tail of Follows Distributed and Distributed, and Distribution of Electric Act. Extensive experiments have been confirmed by Performed Beans Have, and Thierry Findings Clock results through malware data set across two worlds in the real world.
Article Details
Unique Paper ID: 145309

Publication Volume & Issue: Volume 4, Issue 9

Page(s): 19 - 23
Article Preview & Download




Go To Issue



Call For Paper

Volume 5 Issue 4

Last Date 25 September 2018


About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Contact Details

Telephone:704 821 9842/43
Email: editor@ijirt.org
Website: ijirt.org