Author:
Deshpande Prachi,Sharma S. C.,Peddoju Sateesh K.,Abraham Ajith
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Safety, Risk, Reliability and Quality
Reference54 articles.
1. Abraham A, Thomas J, Ghinea G (2003) Mining network quality of service for human computer interaction using neural networks. In: Proceedings of the 10th International Conference on Human–Computer Interaction; 2003 Jun 23–27; Crete, Greece; p 1193–1197
2. Ayala L, Vega M, Vargas L (2013) Emerging threats, risk and attacks in distributed systems: Cloud computing. Lect Notes Electr Eng 152:37–52
3. Balepin I, Maltsev S, Rowe J, Levitt K (2003) Using specification-based intrusion detection for automated response. Lect Notes Comput Sci 2820:136–154
4. Barron C,Yu H, Zhan J (2013) Cloud computing security case studies and research. In: Proceedings of World Congress on Engineering, 2013 Jul 3–5; London, UK; pp 1–5
5. Bellovin S, Blaze M, Diffie W, Landau S, Neumann P, Rexford J (2008) Risking communications security: potential hazards of the protect America act. IEEE Secur Priv 6(1):24–33
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Risk Assessment on Cloud: A Systematic Mapping Study;Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering;2024-06-18
2. Robotic safety and hygiene attributes: visitors’ intention to receive robot-delivered hospitality services;Journal of Hospitality and Tourism Technology;2024-04-15
3. The Dark Web;SSRN Electronic Journal;2024
4. Programming Languages;SSRN Electronic Journal;2024
5. Cyber Security & Artificial Intelligence;SSRN Electronic Journal;2024