Publisher
Springer International Publishing
Reference66 articles.
1. J. Xiong, X. Liu, Z. Yao, J. Ma, Q. Li, K. Geng, S.P. Chen, A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448–458 (2014)
2. N. Sengupta, Designing encryption and IDS for cloud security. in The second International Conference on Internet of Things, Data and Cloud Computing (ICC 2017), Cambridge city, Churchill College, University of Cambridge, United Kingdom, 22–23 March 2017
3. M. Ficco, M. Rak, Stealthy Denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 3(1), 80–94 (2015)
4. D. Talia, P. Trunfio, F. Marozzo, Data Analysis in the Cloud: Models, Techniques and Applications (Elsevier Science Publishers B.V. Amsterdam, The Netherlands, 2015). ISBN:0128028815 9780128028810
5. C.A. Chen, M. Won, R. Stoleru, G.G. Xie, Energy-efficient fault-tolerant data storage and processing in mobile cloud. IEEE Trans. Cloud Comput. 3(1), 28–41 (2015)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Data Reduction;Intrusion Detection;2020
2. Discretization;Intrusion Detection;2020