共 50 条
- [21] Technical Solutions for Mitigating Security Threats Caused by Health Professionals in Clinical Settings [J]. 2015 37TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2015, : 1389 - 1392
- [22] Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures [J]. CLOUD COMPUTING, 2010, 34 : 73 - 82
- [23] Detection and Mitigation of Security Threats Using Virtualized Network Functions in Software-Defined Networks [J]. APPLIED SCIENCES-BASEL, 2024, 14 (01):
- [24] Research on Security Threats Using VPN in Zero Trust Environments [J]. INFORMATION SECURITY APPLICATIONS, WISA 2023, 2024, 14402 : 55 - 66
- [25] Security Threats in 5G Edge Computing Environments [J]. 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 905 - 907
- [26] Life-logging in Smart Environments: Challenges and Security Threats [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
- [27] Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments [J]. INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 70 - 84
- [29] Model of data security for mid-range organizations with using the virtualized environments [J]. INFORMATICS 2013: PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON INFORMATICS, 2013, : 61 - 66
- [30] Recovery for Virtualized Environments [J]. 2015 ELEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC), 2015, : 25 - 36