메뉴 건너뛰기




Volumn , Issue , 2012, Pages 36-53

Three misuse patterns for cloud computing

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84894224926     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-2125-1.ch003     Document Type: Chapter
Times cited : (25)

References (16)
  • 9
    • 80052566799 scopus 로고    scopus 로고
    • The dark cloud: Understanding and defending against botnets and stealthy malware
    • Intel Corporation., Retrieved from
    • Intel Corporation. (2009). The dark cloud: Understanding and defending against botnets and stealthy malware. Intel Technology Journal, 13(02). Retrieved from http://www.intel.com/technology/itj/2009/v13i2/ITJ9.2.9-Cloud.htm
    • (2009) Intel Technology Journal , vol.13 , Issue.2
  • 12
    • 77954931494 scopus 로고    scopus 로고
    • Intrusion detection for grid and cloud computing
    • doi:10.1109/MITP.2009.89
    • Vieira, K., Schulter, A., Westphall, C. B., & Westphall, C. M. (2010). Intrusion detection for grid and cloud computing. IT Professional, 38-43. doi:10.1109/MITP.2009.89
    • (2010) IT Professional , pp. 38-43
    • Vieira, K.1    Schulter, A.2    Westphall, C.B.3    Westphall, C.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.