[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Singh, 2014 - Google Patents

Comprehensive solution to mitigate the cyber-attacks in cloud computing

Singh, 2014

View PDF
Document ID
16317947551157346686
Author
Singh J
Publication year
Publication venue
International Journal of Cyber-Security and Digital Forensics (IJCSDF)

External Links

Snippet

Cloud computing is a web based utility model. Cybercrimes effecting web based system are equally applicable in the cloud computing. Considering the sensitivity and the damage that can be caused by cybercrimes, this work is an effort to study the various cyber threats and …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
AL-Hawamleh Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures
Singh Cyber-attacks in cloud computing: A case study
Tirumala et al. Analysis and prevention of account hijacking based incidents in cloud environment
Hutchings et al. Cloud computing for small business: Criminal and security threats and prevention measures
Shah et al. Security issues on cloud computing
Mosca et al. Cloud security: Services, risks, and a case study on amazon cloud services
Wani et al. Analysis and countermeasures for security and privacy issues in cloud computing
Chivukula et al. A study of cyber security issues and challenges
Khandelwal et al. An insight into the security issues and their solutions for android phones
Singh Comprehensive solution to mitigate the cyber-attacks in cloud computing
Cekerevac et al. HACKING, PROTECTION AND THE CONSEQUENCES OF HACKING.
Al Aqrabi et al. A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service
Bajaj et al. Cloud security: the future of data storage
Christina Proactive measures on account hijacking in cloud computing network
Raj et al. Mapping of Security Issues and Concerns in Cloud Computing with Compromised Security Attributes
Huyghue Cybersecurity, internet of things, and risk management for businesses
Rai et al. Study of security risk and vulnerabilities of cloud computing
Ouahman Security and privacy issues in cloud computing
Hutchings et al. Criminals in the cloud: Crime, security threats, and prevention measures
Droppa et al. Analysis of cybersecurity in the real environment
AlHumaidan et al. Analysis of cloud computing security in perspective of saudi arabia
Sowrirajan A literature based study on cyber security vulnerabilities
Ullah et al. Tcloud: Challenges And Best Practices For Cloud Computing
Mansfield-Devine Locking the door: tackling credential abuse
Rohilla et al. Comparison of Cloud Computing Security Threats and Their Counter Measures