Research Article

Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment

Figure 4

Effect of and on , , .