Login / Signup

Analysis on Cloud-Based Security Vulnerability Assessment.

Huan-Chung LiPo-Huei LiangJiann-Min YangShiang-Jiun Chen
Published in: ICEBE (2010)
Keyphrases
  • risk assessment
  • data sets
  • image analysis
  • information retrieval
  • cloud computing
  • intrusion detection
  • information security
  • quality assessment
  • forensic analysis