Skip to main content
Fig. 4 | Cybersecurity

Fig. 4

From: Cloud repository as a malicious service: challenge, identification and implication

Fig. 4

Bars show smaller topological diversity. a Cumulative distribution of bucket usage similarity per of connected ratio per cloud landing similarity per cloud bucket. b Cumulative distribution bucket usage similarity per of connected ratio per cloud landing similarity per cloud bucket. c Cumulative distribution of bucket usage similarity per of connected ratio per cloud landing similarity per cloud bucket

Back to article page