Download Now Free registration required
Cloud computing is primarily being use for eliminating the need of local information resources. The ability of cloud offers vast variety of services on web. As Smartphone usage has been continuously increasing in recent years, but due to its complexity and functionality, they are also susceptible to the attacks such as virus, Trojans and worms. The smart phones have inadequate storage, processing and computational power to execute highly complex algorithms for intrusion detection and implementing signature based attack detection.
- Format: PDF
- Size: 483.84 KB