共 51 条
[3]
Cloud Computing Security Threats and Attacks with their Mitigation Techniques
[J].
2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC),
2017,
:244-251
[4]
MAPE-K-Based Approach for Security @ Runtime
[J].
2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SCIENCE, TECHNOLOGY AND ENGINEERING (SWSTE 2016),
2016,
:138-140
[5]
Andrade R, 2018, 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P478, DOI 10.1109/CCWC.2018.8301745
[6]
[Anonymous], COMPORTAMIENTO HUMAN
[7]
[Anonymous], 2016, SUST DEV GOALS 2016
[8]
[Anonymous], RES METHODS CYBERSEC
[9]
[Anonymous], 2016, NATURAL COMPUTING SE, DOI DOI 10.1007/978.3.319.39675.0.2
[10]
[Anonymous], IEEE T EMERG TOP COM