Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{145309, author = {G.Komala}, title = {Malware test on cloud computing infrastructure}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {4}, number = {9}, pages = {19-23}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=145309}, abstract = {This malware poses a serious threat to the network of Pervasive security, networks. However, they have to understand that malware debts are very limited in network behavior. In this paper, Investigate Propagates from the international perspective on how they are in malware networks. Structural problem and both come with epidemic layer network network Propagation malware of precise designs. Image based model and suggested that we are Indicates, Bali Resource Malware Analysis, Respectively Phase, so quickly distributed to the Distribution of Power Law with a small tail of Follows Distributed and Distributed, and Distribution of Electric Act. Extensive experiments have been confirmed by Performed Beans Have, and Thierry Findings Clock results through malware data set across two worlds in the real world. }, keywords = {Malware, propagation, modelling, power law.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry