共 51 条
- [3] Cloud Computing Security Threats and Attacks with their Mitigation Techniques [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
- [4] MAPE-K-Based Approach for Security @ Runtime [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SCIENCE, TECHNOLOGY AND ENGINEERING (SWSTE 2016), 2016, : 138 - 140
- [5] Andrade R, 2018, 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P478, DOI 10.1109/CCWC.2018.8301745
- [6] [Anonymous], COMPORTAMIENTO HUMAN
- [7] [Anonymous], 2016, SUST DEV GOALS 2016
- [8] [Anonymous], RES METHODS CYBERSEC
- [9] [Anonymous], 2016, NATURAL COMPUTING SE, DOI DOI 10.1007/978.3.319.39675.0.2
- [10] [Anonymous], IEEE T EMERG TOP COM