Research Article

Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment

Figure 3

The immune mechanism of the model.