Author:
Feng Yansheng,Ma Hua,Chen Xiaofeng
Publisher
Computers, Materials and Continua (Tech Science Press)
Subject
Artificial Intelligence,Computational Theory and Mathematics,Theoretical Computer Science,Software
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Threat-Specific Security Risk Evaluation in the Cloud;2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI);2024-05-09
2. Design and implementation of trust based access control model for cloud computing;AIP Conference Proceedings;2024
3. Securing Files on Cloud Storage with Group Key Management Protocol;2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA);2023-08-03
4. Cloud Computing using OWASP: Open Web Application Security Project;2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS);2023-05-17
5. An Effective Dynamic Propagation Model for Malware Detection in Cloud Platform;2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS);2022-03-25