Author:
Mukoko Fungayi Donewell,Jatain Aman,Arora Yojna
Publisher
Springer Nature Singapore
Reference33 articles.
1. Kirubakaran, S. S. (2020). Study of security mechanisms to create a secure cloud in a virtual environment with the support of cloud service providers. Journal of Trends in Computer Science and Smart Technology (TCSST), 2(03).
2. Joe, C. V., Raj, J. S., & Smys, S. (2021). Mixed mode analytics architecture for data deduplication in wireless personal cloud computing. Wireless Personal Communications, 116(1).
3. Mukoko, F. D., & Thada, V. (2018). A primer on intelligent defense mechanism to counter cloud silent attacks. In 3rd International Conference on Contemporary Computing and Informatics (IC3I). IEEE.
4. Chandra, J. V., Challa, N., SaiKiran, P., Thirupathi, R. K., & Krishna, R. V. (2015). Numerical formulation and simulation of social networks using graph theory on social cloud platform. Global Journal of Pure and Applied Mathematics, 11(2), 1253–1264.
5. Liu, Y., Reiter, M. K., & Ning, P. (2009, November). False data injection attacks against state estimation in electric power grids. In The 16th ACM Conference on Computer and Communications Security, Chicago, IL.