A Study on Security Mitigation Models in Cloud Computing
暂无分享,去创建一个
[1] Naseer Amara,et al. Cloud Computing Security Threats and Attacks with Their Mitigation Techniques , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[2] Mohit Sharma,et al. Cloud computing and its security issues — A review , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[3] Shao Ying Zhu,et al. A survey on top security threats in cloud computing , 2015 .
[4] Fawaz S. Al-Anzi,et al. Cloud computing: Security model comprising governance, risk management and compliance , 2014, 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC).
[5] Sajjad Haider,et al. Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[6] Tejaswi Agarwal,et al. Cloud Computing: Security Issues, Mitigation and a Secure Cloud Architecture , 2012 .
[7] Ajanthaa Lakkshmanan,et al. Security concerns and risk at different levels in Cloud Computing , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).
[8] R. Sridaran,et al. An Analysis of Security Challenges in Cloud Computing , 2013 .
[9] Amanpreet Kaur,et al. Mitigation of DDoS attacks in cloud computing , 2016, 2016 5th International Conference on Wireless Networks and Embedded Systems (WECON).