Author:
Bharadwaj Deepak R,Bhattacharya Anamika,Chakkaravarthy Manivannan
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring BI Data Transition to the Cloud: Analysis & Recommendations;Proceedings of the 2024 Asia Pacific Conference on Computing Technologies, Communications and Networking;2024-07-26
2. Security threat analysis and countermeasure using ML in cloud;AIP Conference Proceedings;2024
3. Enhancing Efficiency Through Infrastructure Automation: An In-Depth Analysis of Infrastructure as Code (IaC) Tools;2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS);2023-11-03
4. Navigating Web Application Security: A Survey of Vulnerabilities and Detection Solutions;2023 IEEE 64th International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS);2023-10-05
5. A Literature Review of Challenges and Solutions in Cloud Security;2023 10th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE);2023-08-31