Author:
Gayatri P.,Venunath M.,Subhashini V.,Umar Syed
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Uncovering Cloud Security Complexities-A Comprehensive Five-Perspective Taxonomic Review;2024-06-03
2. Security Enabled Framework to Access Information in Cloud Environment;2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON);2022-05-26
3. Allocating and Routing Resources in an IoT Network with an Efficient Hybrid Optimization Approach;2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2022-05-09
4. Cloud Forensics: Threat Assessment and Proposed Mitigations;2022 International Conference for Advancement in Technology (ICONAT);2022-01-21
5. Securing Cloud Data by Using Blend Cryptography with AWS Services;AI and IoT‐Based Intelligent Automation in Robotics;2021-04-15