-
1
Research on continuous monitoring of cloud computing service
Published 2016-10-01Subjects: Get full text
Article -
2
Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild
Published 2024-01-01Subjects: “…Cloud computing security…”
Get full text
Article -
3
CLOUD COMPUTING SECURITY
Published 2016-05-01Subjects: “…cloud computing; security; public services; composite services; best practices;…”
Get full text
Article -
4
Formal Description of Trusted Bebavior Oriented Security System for Big Data
Published 2014-07-01Subjects: “…big data;cloud computing security;formalization;Z…”
Get full text
Article -
5
Research on cloud computing users’ public safety trust model based on scorecard-random forest
Published 2018-05-01Subjects: “…cloud computing security…”
Get full text
Article -
6
Building a Comprehensive Trust Evaluation Model to Secure Cloud Services From Reputation Attacks
Published 2024-01-01Subjects: Get full text
Article -
7
Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
Published 2025-07-01Subjects: “…cloud computing security,…”
Get full text
Article -
8
Dynamic secret sharing for enhanced cloud security: Tackling eavesdropping and threshold attacks
Published 2025-06-01Subjects: Get full text
Article -
9
Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
Published 2022-11-01Subjects: “…Cloud computing security…”
Get full text
Article -
10
Securing the Shared Kernel: Exploring Kernel Isolation and Emerging Challenges in Modern Cloud Computing
Published 2024-01-01Subjects: Get full text
Article -
11
-
12
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article -
13
Research on cloud computing network security mechanism and optimization in university education management informatization based on OpenFlow
Published 2025-12-01Subjects: “…Cloud computting security mechanism…”
Get full text
Article