Malware test on cloud computing infrastructure

  • Unique Paper ID: 145309
  • Volume: 4
  • Issue: 9
  • PageNo: 19-23
  • Abstract:
  • This malware poses a serious threat to the network of Pervasive security, networks. However, they have to understand that malware debts are very limited in network behavior. In this paper, Investigate Propagates from the international perspective on how they are in malware networks. Structural problem and both come with epidemic layer network network Propagation malware of precise designs. Image based model and suggested that we are Indicates, Bali Resource Malware Analysis, Respectively Phase, so quickly distributed to the Distribution of Power Law with a small tail of Follows Distributed and Distributed, and Distribution of Electric Act. Extensive experiments have been confirmed by Performed Beans Have, and Thierry Findings Clock results through malware data set across two worlds in the real world.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{145309,
        author = {G.Komala},
        title = {Malware test on cloud computing infrastructure},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {9},
        pages = {19-23},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=145309},
        abstract = {This malware poses a serious threat to the network of Pervasive security, networks. However, they have to understand that malware debts are very limited in network behavior. In this paper, Investigate Propagates from the international perspective on how they are in malware networks. Structural problem and both come with epidemic layer network network Propagation malware of precise designs. Image based model and suggested that we are Indicates, Bali Resource Malware Analysis, Respectively Phase, so quickly distributed to the Distribution of Power Law with a small tail of Follows Distributed and Distributed, and Distribution of Electric Act. Extensive experiments have been confirmed by Performed Beans Have, and Thierry Findings Clock results through malware data set across two worlds in the real world.

},
        keywords = {Malware, propagation, modelling, power law.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 4
  • Issue: 9
  • PageNo: 19-23

Malware test on cloud computing infrastructure

Related Articles