![]() |
Volumn 8, Issue 2, 2010, Pages 57-58
|
Hide and seek in the cloud
|
Author keywords
Cloud computing; Cybercrime; Security and privacy; Virtual machines
|
Indexed keywords
CLOUD COMPUTING;
COMPUTING ECOSYSTEMS;
CYBERCRIME;
SECURITY AND PRIVACY;
VIRTUAL MACHINES;
COMPUTER CRIME;
|
EID: 77950653648
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2010.70 Document Type: Article |
Times cited : (14)
|
References (1)
|