共 50 条
- [41] AN OVERVIEW OF CLOUD COMPUTING IN DISTRIBUTED SYSTEMS [J]. INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10), 2010, 1324 : 184 - 186
- [42] Forensic Model for Cloud Computing: An Overview [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1291 - 1295
- [44] An Overview of Data Storage in Cloud Computing [J]. 2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 29 - 34
- [46] Effective Way to Defend the Hypervisor Attacks in Cloud Computing [J]. 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 154 - 159
- [47] Cloud Computing Security Threats and Attacks with their Mitigation Techniques [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
- [48] ANALYSIS OF VARIOUS VIRTUAL MACHINE ATTACKS IN CLOUD COMPUTING [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1016 - 1019
- [49] Study on DDoS Attacks based on DPDK in Cloud Computing [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
- [50] Cache Side-Channel Attacks in Cloud Computing [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146