Login / Signup

Assessing Cloud Computing Security Threats in Malaysian Organization Using Fuzzy Delphi Method.

Nurbaini ZainuddinRasimah Che Mohd YusuffGanthan Narayana Samy
Published in: SCDM (2022)
Keyphrases
  • cloud computing
  • security issues
  • sensor networks
  • security threats
  • database
  • real time
  • anomaly detection
  • service oriented
  • computing resources