Login / Signup
Systematic identification of threats in the cloud: A survey.
Jin B. Hong
Armstrong Nhlabatsi
Dong Seong Kim
Alaa Hussein
Noora Fetais
Khaled M. Khan
Published in:
Comput. Networks (2019)
Keyphrases
</>
cloud computing
qualitative and quantitative
virtual machine
countermeasures
person identification
data sets
face recognition
computer security