Information security outsourcing in a resource-sharing environment: The impacts of attack modes.
Xing GaoSiyu GongYing WangYanfang ZhangPublished in: J. Oper. Res. Soc. (2024)
Keyphrases
- information security
- resource sharing
- countermeasures
- information systems
- security issues
- intrusion detection
- security risks
- smart card
- network security
- virtual organization
- resource allocation
- grid computing
- real time
- load balancing
- information security management
- information technology
- critical infrastructure
- cyber attacks
- smart grid
- cyber defense
- distributed computing
- information sharing
- peer to peer
- e government
- data mining