Return to Article Details An Enhanced Model for Intrusion Detection in a Cloud Computing Environment Download Download PDF