Singh, 2014 - Google Patents
Comprehensive solution to mitigate the cyber-attacks in cloud computingSingh, 2014
View PDF- Document ID
- 16317947551157346686
- Author
- Singh J
- Publication year
- Publication venue
- International Journal of Cyber-Security and Digital Forensics (IJCSDF)
External Links
Snippet
Cloud computing is a web based utility model. Cybercrimes effecting web based system are equally applicable in the cloud computing. Considering the sensitivity and the damage that can be caused by cybercrimes, this work is an effort to study the various cyber threats and …
- 230000005540 biological transmission 0 abstract description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AL-Hawamleh | Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures | |
Singh | Cyber-attacks in cloud computing: A case study | |
Tirumala et al. | Analysis and prevention of account hijacking based incidents in cloud environment | |
Hutchings et al. | Cloud computing for small business: Criminal and security threats and prevention measures | |
Shah et al. | Security issues on cloud computing | |
Mosca et al. | Cloud security: Services, risks, and a case study on amazon cloud services | |
Wani et al. | Analysis and countermeasures for security and privacy issues in cloud computing | |
Chivukula et al. | A study of cyber security issues and challenges | |
Khandelwal et al. | An insight into the security issues and their solutions for android phones | |
Singh | Comprehensive solution to mitigate the cyber-attacks in cloud computing | |
Cekerevac et al. | HACKING, PROTECTION AND THE CONSEQUENCES OF HACKING. | |
Al Aqrabi et al. | A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service | |
Bajaj et al. | Cloud security: the future of data storage | |
Christina | Proactive measures on account hijacking in cloud computing network | |
Raj et al. | Mapping of Security Issues and Concerns in Cloud Computing with Compromised Security Attributes | |
Huyghue | Cybersecurity, internet of things, and risk management for businesses | |
Rai et al. | Study of security risk and vulnerabilities of cloud computing | |
Ouahman | Security and privacy issues in cloud computing | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
Droppa et al. | Analysis of cybersecurity in the real environment | |
AlHumaidan et al. | Analysis of cloud computing security in perspective of saudi arabia | |
Sowrirajan | A literature based study on cyber security vulnerabilities | |
Ullah et al. | Tcloud: Challenges And Best Practices For Cloud Computing | |
Mansfield-Devine | Locking the door: tackling credential abuse | |
Rohilla et al. | Comparison of Cloud Computing Security Threats and Their Counter Measures |