Sign in

Detecting the run time attacks in the cloud with an evidence collection based approach.

Jie LinChuanyi LiuZhichun NingBinxing Fang
Published in: CCIS (2014)
Keyphrases