A survey of cloud computing security overview of attack vectors and defense mechanisms
Citation
Lemoudden, M., Ben Bouazza, N., El Ouahidi, B., & Bourget, D. (2013). A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical and Applied Information Technology, 54(2), 325-330
Authors
Keywords
Attack, Cloud computing, Defense, Security, Threat, Vulnerability
Monthly Views: