Author:
Faisal Abu,Zulkernine Mohammad
Funder
Natural Sciences and Engineering Research Council of Canada
Canada Research Chairs
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference50 articles.
1. Abdallah, E.G., Zulkernine, M., Gu, Y.X., Liem, C.: Trust-cap: A trust model for cloud-based applications. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 584–589 (2017). https://doi.org/10.1109/COMPSAC.2017.256
2. Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelin, S., Zimmermann, P.: Imperfect forward secrecy: How Diffie-Hellman fails in practice. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15, pp. 5–17. ACM, New York, NY, USA (2015). https://doi.org/10.1145/2810103.2813707
3. Alós, A., Morán, F., Carballeira, P., Berján, D., García, N.: Congestion control for cloud gaming over udp based on round-trip video latency. IEEE Access 7, 78882–78897 (2019). https://doi.org/10.1109/ACCESS.2019.2923294
4. Amara, N., Zhiqui, H., Ali, A.: Cloud computing security threats and attacks with their mitigation techniques. In: 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 244–251 (2017). https://doi.org/10.1109/CyberC.2017.37
5. Amazon Web Services: Amazon Web Services: Overview of Security Processes. https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf (2017). Accessed 25 July 2019
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献