Login / Signup
Towards Configurable Vulnerability Assessment in the Cloud.
Kyriakos Kritikos
Manos Papoutsakis
Sotiris Ioannidis
Kostas Magoutis
Published in:
CAMAD (2019)
Keyphrases
</>
risk assessment
cloud computing
e learning
case study
database systems
multiscale
centered design
artificial intelligence
social networks
website
similarity measure
multi agent
expert systems
evolutionary algorithm
assessment process