共 52 条
- [2] Almorsy M., 2011, Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing (CLOUD 2011), P364, DOI 10.1109/CLOUD.2011.9
- [3] Arora R., 2013, INT J ENG RES AFR, V3, P1922
- [4] Banerjee C, 2013, 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES (ICACT)
- [5] Banyal Rohitash Kumar, 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), P105, DOI 10.1109/CIMSim.2013.25
- [7] A cloud-edge based data security architecture for sharing and analysing cyber threat information [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 710 - 722
- [8] Chang V, 2016, IEEE T SERV COMPUT, V9, P138, DOI [10.1109/TSC.2015.2491281, 10.1109/ISSNIP.2015.7106910]
- [9] Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service [J]. IEEE ACCESS, 2019, 7 : 110510 - 110517