Login / Signup

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level.

Tsvetoslava Vateva-GurovaSalman ManzoorRubén TraperoNeeraj Suri
Published in: IOSec@RAID (2018)
Keyphrases
  • covert channel
  • access control
  • resource allocation
  • data mining
  • artificial intelligence
  • computer systems
  • information security