From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unified Cloud Access Control Model for Cloud Storage Broker., , , , и . ICOIN, стр. 60-65. IEEE, (2019)Unified logging system for monitoring multiple cloud storage providers in cloud storage broker., , , , и . ICOIN, стр. 44-49. IEEE, (2018)A Feasibility Study of Log-Based Monitoring for Multi-cloud Storage Systems., , , , , и . AINA (2), том 226 из Lecture Notes in Networks and Systems, стр. 458-471. Springer, (2021)Holistic Strategy-Based Threat Model for Organizations., , , и . ANT/EDI40, том 151 из Procedia Computer Science, стр. 100-107. Elsevier, (2019)Application of quantitative security metrics in cloud computing., , и . ICITST, стр. 256-262. IEEE, (2015)Towards Cloud-Aware Vulnerability Assessments., и . SITIS, стр. 746-751. IEEE Computer Society, (2015)Security Chaos Engineering for Cloud Services: Work In Progress., , , и . NCA, стр. 1-3. IEEE, (2019)CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era., , , и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 471-490. Springer, (2018)CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems., , , , , и . NCA, стр. 1-10. IEEE, (2018)Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage., , , и . SIN, стр. 3-10. ACM, (2017)