Author:
Hussain Syed Asad,Fatima Mehwish,Saeed Atif,Raza Imran,Shahzad Raja Khurram
Subject
Computer Science Applications,Information Systems,Software
Reference24 articles.
1. The NIST definition of cloud computing;Mell,2011
2. Survey on security issues in cloud computing and associated mitigation techniques;Bhadauria;Int. J. Comput. Appl.,2012
3. Security considerations in cloud computing virtualization environment;Yeo;Grid Pervasive Comput. Lecture Notes Comput. Sci.,2013
4. Cloud computing and security challenges;Yu,2013
Cited by
70 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Logs2Vul: Vulnerability Detection from Logs for CSPM;2024 Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT);2024-01-11
2. Emerging Trends in Cloud Computing Paradigm: An Extensive Literature Review on Cloud Security, Service Models, and Practical Suggestions;Advanced Sciences and Technologies for Security Applications;2024
3. Cloud Computing;Internet Computing;2024
4. Comparative Study of Security Threats in Cloud Computing;2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N);2023-12-15
5. Deep Ensemble Classification with Self Improved Optimization for Attack Detection Towards Secured Virtualization in Cloud;International Journal on Artificial Intelligence Tools;2023-11