Author:
Srivastava Nishtha,Chaudhari Ashish,Joraviya Nidhi,Gohil Bhavesh N.,Ray Suprio,Rao Udai Pratap
Reference40 articles.
1. Smith J (2012) Cloud security incident reporting: framework for reporting about major cloud security incidents
2. Duncan A, Creese S, Goldsmith M (2015) An overview of insider attacks in cloud computing. Concurr Comput: Pract Exp 27(12):2964–2981
3. Mishra P, Pilli ES, Varadharajant V, Tupakula U (2016) Black hat presentation demo vids: amazon. In: 2016 international conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 56–62
4. Fields T, Graham J (2016) Classifying network attack data using random forest. CATA, Dec
5. King ST, Chen PM (2006) Subvirt: implementing malware with virtual machines. In: 2006 IEEE symposium on security and privacy S & P’06). IEEE, pp 14–pp
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献