Login / Signup
Analysis on Cloud-Based Security Vulnerability Assessment.
Huan-Chung Li
Po-Huei Liang
Jiann-Min Yang
Shiang-Jiun Chen
Published in:
ICEBE (2010)
Keyphrases
</>
risk assessment
data sets
image analysis
information retrieval
cloud computing
intrusion detection
information security
quality assessment
forensic analysis