no code implementations • 25 Nov 2014 • Marc Solanas, Julio Hernandez-Castro, Debojyoti Dutta
They can be either illegal activities, such as launching a DDoS attack or just activities which are undesired by the cloud provider, such as Bitcoin mining, which uses substantial power, reduces the life of the hardware and can possibly slow down other user's activities.