Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference68 articles.
1. Mell P, Grance T (2011) The NIST definition of cloud computing, SP 800-145. National Institute of Standards and Technology, Gaithersburg.
https://csrc.nist.gov/publications/detail/sp/800-145/final
. Accessed 18 Sept 2018.
2. Hirano M, Ogawa H (2016) A log-structured block preservation and restoration system for proactive forensic data collection in the cloud In: Availability, Reliability and Security (ARES), 2016 11th International Conference On, 355–364.. IEEE.
https://doi.org/10.1109/ARES.2016.8
.
3. Hirano M, Takase H, Yoshida K (2015) Evaluation of a sector-hash based rapid file detection method for monitoring infrastructure-as-a-service cloud platforms In: Availability, Reliability and Security (ARES), 2015 10th International Conference On, 584–591.. IEEE.
https://doi.org/10.1109/ARES.2015.15
.
4. Shostack A (2014) Threat Modeling: Designing for Security. Wiley, Hoboken.
5. Palmer G (2001) A road map for digital forensic research In: First Digital Forensic Research Workshop, 27–30, Utica.
http://dfrws.org/sites/default/files/session-files/a_road_map_for_digital_forensic_research.pdf
. Accessed 18 Sept 2018.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献