Leonardo Silva Melo

Learn More
The elasticity and abundant availability of computational resources are attractive to intruders exploit cloud vulnerabilities and were able to launch attacks against legitimate users to gain access to private and privileged information. The Intrusion Detection Systems are presented as a possible solution for protection; however, to effectively protect the(More)
  • 1