共 50 条
- [21] IT Security Threats in Cloud Computing Sourcing Model 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
- [22] Research on security threats and Countermeasures for Cloud Computing PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327
- [23] Situational Crime Prevention and the Mitigation of Cloud Computing Threats SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 218 - 233
- [24] A Study on Security Mitigation Models in Cloud Computing PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 446 - 450
- [26] Cyber Security Threats and Mitigation Techniques for Multifunctional Devices 2018 CONFERENCE ON INFORMATION COMMUNICATIONS TECHNOLOGY AND SOCIETY (ICTAS), 2018,
- [28] Cloud computing and data security threats taxonomy: A review Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537
- [29] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
- [30] Security Threats in Cloud Computing Models: Domains and Proposals 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 383 - 389