Author:
Al-Asadi Avein Jabar,Arundathi J. V. S.,Dahiya Omdev,Wahab Hashmi Abdul,Gupta Ankur,Alazzam Malik Bader
Reference33 articles.
1. M. Georgescu and M. Matei 2013, The value of cloud computing in business environment, The USV Annals of Economics and Public Administration, Vol. 13, no. 1, Pp. 222-228, 2013.
2. Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A. & Kishigami, J. J. (2015). Blockchain contract: A complete consensus using blockchain. 2015 IEEE 4th Global Conference on Consumer Electronics (GCCEP).
3. 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) Amita Kashyap, G. Sravan Kumar, Sunita Jangir, Emmanuel S. Pilli, Preeti Mishra “IHIDS: Introspection-Based Hybrid Intrusion Detection System in Cloud Environment”
4. Lenka Lhotska, Petr Aubrecht, Karina Gibert, Aida Valls (2008). Security recommendations for implementation in distributed healthcare systems. 42nd Annual IEEE International Carnahan Conference on iccst-2008.
5. Zhe, D., Qinghong, W., Naizheng, S., & Yuhan Z. (2017). Study on Data Security Policy Based on Cloud Storage. 2017 IEEE 3rd International Conference on Big Data Security on Cloud (Big Data Security), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring the Effects of Block Chain-Based Security Systems on Cyber Security;2024 2nd International Conference on Disruptive Technologies (ICDT);2024-03-15