Research Article
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
Table 4
Description of atomic protect strategy.
| Number | Protection action name | Protect strategy | | |
| | System update | | √ | | Behavioral filtering | | √ | | Abnormal recognition | √ | | | Delete suspicious accounts | √ | | | Tool detection | | √ | | Firmware update | √ | |
|
|