Login / Signup
Security vulnerabilities from inside and outside the Eucalyptus cloud.
Marjan Gusev
Sasko Ristov
Aleksandar Donevski
Published in:
BCI (2013)
Keyphrases
</>
security vulnerabilities
intrusion detection
cloud computing
penetration testing
dos attacks
security properties
virtual machine
unauthorized access
databases
anomaly detection