Author:
Shalki Sharma ,Anshul Gupta ,Sanjay Agrawal
Reference17 articles.
1. Mell, Peter, and Tim Grance. “The NIST definition of cloud computing.” (2011).
2. Top Threats Working Group. “The notorious nine: cloud computing top threats in 2013.” Cloud Security Alliance (2013).
3. Akbarabadi, Ahad, et al. “Client To Client Attacks Protection in Cloud Computing By a Secure Virtualization Model.” Journal of Next Generation Information Technology 4.8 (2013).
4. Chen, Shuo, et al. “Side-channel leaks in web applications: A reality today, a challenge tomorrow.” Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 2010.
5. Joshi, Bansidhar, A. Santhana Vijayan, and Bineet Kumar Joshi. “Securing cloud computing environment against DDoS attacks.” Computer Communication and Informatics (ICCCI), 2012 International Conference on. IEEE, 2012.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献