共 50 条
- [21] Dancing on a Volcano: Subverting Catastrophe in MP Shiel's The Purple Cloud NINETEENTH-CENTURY CONTEXTS-AN INTERDISCIPLINARY JOURNAL, 2018, 40 (02): : 149 - 163
- [22] Alternative Data Streams in NTFS - A Gateway for Subverting Endpoint Security Systems INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12): : 71 - 75
- [23] Cloud Computing: Cloud Security to Trusted Cloud NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
- [24] CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (09): : 2228 - 2231
- [25] Ransom Access Memories: Achieving Practical Ransomware Protection in Cloud with DeftPunk PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 687 - 702
- [26] Cloud Security Can the cloud be secured? 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 208 - 210
- [27] A Survey of Cloud Computing and Cloud Security PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
- [28] Cloud computing and cloud security in China ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955
- [30] Mitigating Ransomware Risks in Manufacturing and the Supply Chain: A Comprehensive Security Framework INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2023, 17 (02): : 231 - 249