共 17 条
[1]
A Prototype Implementation of Continuous Authentication for Tactical Applications
[J].
AD HOC NETWORKS, ADHOCNETS 2016,
2017, 184
:342-353
[3]
Coles C., 2015, CLOUD ADOPTION PRACT
[6]
KPMG, 2014, Cloud Survey Report: Elevating Business in the Cloud
[7]
KUMAR S, 2016, J SYST SOFTWARE, V4, P148, DOI DOI 10.17354/IJSS/2016/272
[10]
Msilini N, 2017, INTEL SYST REF LIBR, V115, P59, DOI 10.1007/978-3-319-44270-9_3