Author:
Chitturi Arun Krishna,Swarnalatha Purushotham
Reference13 articles.
1. Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications. IGI Global, pp. 268–285 (2018)
2. Luigi, C., et al.: Cloud security: emerging threats and current solutions. Comput. Electr. Eng. 59, 126–140 (2017)
3. Al Awadhi, E., Salah, K., Martin, T.: Assessing the security of the cloud environment. In: 2013 7th IEEE GCC Conference and Exhibition (GCC) (2013)
4. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, IEEE (2012)
5. Walker, K.: Cloud security alliance announces software defined perimeter (sdp) initiative (online) (2013).
https://cloudsecurityalliance.org/media/news/csa-announcessoftware-defined-perimeter-sdp-initiative/
. Accessed October, 2014
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cloud Cryptography;Advances in Computer and Electrical Engineering;2024-01-25
2. Securing Microservices‐Based IoT Networks: Real‐Time Anomaly Detection Using Machine Learning;Journal of Computer Networks and Communications;2024-01
3. Close: A survey on cloud security issues;AIP Conference Proceedings;2024
4. Machine learning based models for detecting attacks in IoT systems;2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME);2023-07-19
5. Cloud Computing Cyber Threats and Vulnerabilities;Advances in Human and Social Aspects of Technology;2023-06-16