共 50 条
- [1] An overview of insider attacks in cloud computing [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2964 - 2981
- [2] Mitigating Insider Data Theft Attacks in the Cloud [J]. 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 561 - 567
- [3] Privileged Account Management Approach for Preventing Insider Attacks [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (01): : 33 - 42
- [4] Ciphertext Retrieval against Insider Attacks for Cloud Storage [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 202 - 206
- [5] Preventing Pollution Attacks in Cloud Storages [J]. 8TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2018), 2018, 143 : 812 - 819
- [6] An Approach for Preventing and Detecting Attacks in the Cloud [J]. 2020 IEEE/ACM 13TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2020), 2020, : 165 - 175
- [7] Cloud Computing: Insider Attacks on Virtual Machines During Migration [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 493 - 500
- [8] Secure Cloud Maintenance Protecting workloads against insider attacks [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
- [9] Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,