SECURITY TECHNIQUES TO PREVENT THREATS AND ATTACKS IN CLOUD ENVIRONMENT
Abstract
Keywords
Full Text:
PDFReferences
Sunilkumar S. Manvi, Gopal Kirshna Shyam, "Resource Management for IaaS in Cloud Computing: A Survey", Elsevier Journal of Network and Computer Applications, Vol. 41, No.1, 2014, pp.424-440. [2]https://pdfs.semanticscholar.org/a28b/3c33f8ebb29983ddd1 f223513c7f1d11cf39.pdf by Mohammad Ubaidullah Bokhari and Qahtan Makki Shallal ,Dept. of Computer Science, Aligarh Muslim University Aligarh, India. [3]https://www.csoonline.com/article/3217029/cloudsecurity/amazon-macie-automates-cloud-data-protection-withmachine-learning.html [4] Dinesh R. C, Ashwin R, "Multi-Agent based Cloud Services", International Journal of Computer Applications, Vol.2, No.1, 2012, pp. 7-10 [5]http://www.datacenterjournal.com/combatting-cloudsecurity-threats-tools-best-practices/
DOI: https://doi.org/10.26483/ijarcs.v9i0.6258
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 International Journal of Advanced Research in Computer Science

