Login / Signup
Multiple-Clouds Computing Security Approaches: A Comparative Study.
Hassan Saad Alqahtani
Paul Sant
Published in:
ICC 2016 (2016)
Keyphrases
</>
network security
real time
machine learning
strengths and weaknesses
sensitive data
security protocols