Author:
Ben Charhi Youssef,Mannane Nada,Bendriss Elmehdi,Regragui Boubker
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IDS Based threat monitoring in Cloud Computing;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2022-01-15
2. Assessing Cloud Computing Security Threats in Malaysian Organization Using Fuzzy Delphi Method;Recent Advances in Soft Computing and Data Mining;2022
3. Threshold based DDoS mitigation with fog layer in cloud environment;Journal of Ambient Intelligence and Humanized Computing;2020-08-19
4. Intrusion detection in cloud computing based attack patterns and risk assessment;Advances in Science, Technology and Engineering Systems Journal;2017-05