Computer Science
Detection Method
100%
Cloud Computing Service
100%
Intrusion Detection System
100%
Intrusion Detection
100%
Cloud Computing
100%
Computing Environment
50%
Anomaly Detection
50%
Systems Performance
50%
Performance Degradation
50%
Learning Process
50%
High-Performance Computing
50%
System Calls
50%
Public Cloud
50%
Unauthorized Access
50%
Success Factor
50%
Security Concern
50%
cloud system
50%
Information Security
50%
Cosine Similarity
50%
Keyphrases
Self-similarity
100%
Similarity-based
100%
Cloud Computing
100%
Intrusion Detection System
100%
Lightweight Intrusion Detection
100%
Abnormal Activity
50%
Cloud Computing Services
33%
Computing Environment
16%
Performance Degradation
16%
System Anomaly
16%
System Performance
16%
Learning Process
16%
High Performance Computing
16%
System Call
16%
Information Security
16%
Unauthorized Access
16%
Few Resources
16%
Similarity Measure
16%
Cosine Similarity
16%
Anomaly Detection System
16%
Optimal Time Interval
16%
Public Cloud Computing
16%
Internal Activity
16%
Security Concerns
16%
Cloud System
16%
Subscriber
16%
Critical Success Factors
16%
System Process
16%
Process Status
16%
Data Leakage
16%
Cost-effectiveness
16%