Login / Signup

Systematic identification of threats in the cloud: A survey.

Jin B. HongArmstrong NhlabatsiDong Seong KimAlaa HusseinNoora FetaisKhaled M. Khan
Published in: Comput. Networks (2019)
Keyphrases
  • cloud computing
  • qualitative and quantitative
  • virtual machine
  • countermeasures
  • person identification
  • data sets
  • face recognition
  • computer security