Login / Signup
Applying a Threat Model to Cloud Computing.
Vincent E. Urias
Brian P. Van Leeuwen
William M. S. Stout
Han Lin
Published in:
ICCST (2018)
Keyphrases
</>
cloud computing
data sets
data center
wireless sensor networks
distributed computing
security issues