Login / Signup

Multiple-Clouds Computing Security Approaches: A Comparative Study.

Hassan Saad AlqahtaniPaul Sant
Published in: ICC 2016 (2016)
Keyphrases
  • network security
  • real time
  • machine learning
  • strengths and weaknesses
  • sensitive data
  • security protocols