共 50 条
- [31] Analyzing Security and Privacy issues for Multi-Cloud Service Providers Using Nessus 2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
- [32] Implementation of Cloud Component for Security Monitoring and Comprehensive Guarantee of Identifier Resolution System 2022 3RD INFORMATION COMMUNICATION TECHNOLOGIES CONFERENCE (ICTC 2022), 2022, : 167 - 172
- [33] Cloud native security and the security posture of cloud resources Electronics World, 2023, 128 (2029):
- [34] How Do Asynchronous Communication Models Impact the Composability of Information Flow Security? FORMAL ASPECTS OF COMPONENT SOFTWARE, FACS 2024, 2024, 15189 : 127 - 145
- [35] Analyzing multiple configurations of a C program ICSM 2005: PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, 2005, : 379 - 388
- [39] Cloud Computing: Cloud Security to Trusted Cloud NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
- [40] Crowdsourced Exploration of Security Configurations CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, : 467 - 476