Cited By
View all- Kumar RGoyal R(2019)On cloud security requirements, threats, vulnerabilities and countermeasuresComputer Science Review10.1016/j.cosrev.2019.05.00233:C(1-48)Online publication date: 1-Aug-2019
- Di Pietro RLombardi F(2018)Virtualization Technologies and Cloud Security: Advantages, Issues, and PerspectivesFrom Database to Cyber Security10.1007/978-3-030-04834-1_9(166-185)Online publication date: 30-Nov-2018
- Rossi FCalheiros RDe Rose C(2017)A Terminology to Classify Artifacts for Cloud InfrastructureResearch Advances in Cloud Computing10.1007/978-981-10-5026-8_4(75-92)Online publication date: 28-Dec-2017
- Show More Cited By