共 16 条
[1]
Atanasov V, 2022, INT J INF TECHNOL SE, V14, P13
[2]
Baby A., 2014, International Journal of Computer Science Issues (IJCSI), V11, P195
[3]
Dai N. H. P., 2016, Journal of Emerging Research and Solutions in ICT, V1, P17, DOI DOI 10.20544/ERSICT.01.16.P02
[4]
Semantic and Agnostic Representation of Cloud Patterns for Cloud Interoperability and Portability
[J].
2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2,
2013,
:182-187
[6]
Garg Tanya, 2021, Proceedings of the Second International Conference on Information Management and Machine Intelligence (ICIMMI 2020). Lecture Notes in Networks and Systems (LNNS 166), P755, DOI 10.1007/978-981-15-9689-6_82
[7]
Garg T., 2022, P 3 INT C INFORM MAN, P635
[8]
Howard M, 2005, COMPUTER SECURITY IN THE 21ST CENTURY, P109, DOI 10.1007/0-387-24006-3_8
[10]
Manadhata P., 2004, Measuring a system's attack surface