Login / Signup
The security vulnerabilities of on-demand and sharing economy.
Daniel Tse
Hok Hin Yuen
Qiran He
Chaoya Wang
Jiheng Yu
Published in:
ICEEG (2018)
Keyphrases
</>
security vulnerabilities
intrusion detection
penetration testing
dos attacks
security properties
information sharing
cloud computing
intrusion detection system
unauthorized access
data mining
attack graphs
sql injection