Publisher
Springer International Publishing
Reference51 articles.
1. Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S., Upton, D.: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1), tyy006 (2018)
2. Kadhim, Q.K., Yusof, R., Mahdi, H.S., Al-shami, S.S.A., Selamat, S.R.: A review study on cloud computing issues. J. Phys: Conf. Ser. 1018, 012006 (2018)
3. Bisong, A., Rahman, S.S.M.: An overview of the security concerns in enterprise cloud computing. Int. J. Netw. Secur. Appl. 3(1), 30–45 (2011)
4. Noyes, D., Liu, H., Fortier, P.: Security analysis and improvement of USB technology. In: 2016 IEEE Symposium on Technologies for Homeland Security (HST). IEEE, May 2016
5. Prasad, R., Rohokale, V.: Mobile device cyber security. In: Springer Series in Wireless Technology. Springer International Publishing, pp. 217–229 (2019)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献