Author:
Wijaya Gautama,Surantha Nico
Subject
Management of Technology and Innovation,Physics and Astronomy (miscellaneous),Engineering (miscellaneous)
Reference15 articles.
1. H. Takabi, J.B.D. Joshi, G.J. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security and Privacy, 8(6), 24-31, 2010, doi:10.1109/MSP.2010.186.
2. M. Almorsy, J. Grundy, I. Müller, "An Analysis of the Cloud Computing Security Problem," International Surgery, 47(3), 288-290, 2016, doi:arXiv:1609.01107.
3. E. Abdurachman, F.L. Gaol, B. Soewito, "ScienceDirect ScienceDirect Survey on Threats and Risks in the Cloud Computing Environment Survey on Threats and Risks in the Cloud Computing Environment," Procedia Computer Science, 161, 1325-1332, 2019, doi:10.1016/j.procs.2019.11.248.
4. M. Jouini, L.B.A. Rabai, "A Security Framework for Secure Cloud Computing Environments," International Journal of Cloud Applications and Computing, 6(3), 32-44, 2016, doi:10.4018/ijcac.2016070103.
5. G.I.P. Duppa, N. Surantha, "Evaluation of network security based on next generation intrusion prevention system," Telkomnika (Telecommunication Computing Electronics and Control), 17(1), 39-48, 2019, doi:10.12928/TELKOMNIKA.v17i1.9191.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献