共 50 条
[2]
[Anonymous], 2016, IBM X FORCE RES 2016
[3]
[Anonymous], 2011, International Workshop on Critical Information Infrastructures Security
[4]
[Anonymous], J MED SYST
[5]
[Anonymous], 2017, SEC 1 1 3
[6]
[Anonymous], 2017, WHAT AR SOM DIS HOM
[7]
Balasaraswathi VR, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), P1190, DOI 10.1109/ICACCCT.2014.7019286
[8]
Chouhan P, 2016, INT J ADV RES COMPUT, V6, P92
[9]
Insider Threats to Cloud Computing: Directions for New Research Challenges
[J].
2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC),
2012,
:387-394
[10]
Duncan A. J., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P857, DOI 10.1109/TrustCom.2012.188