Skip to content
VuFind
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Sámegiella
Монгол
Language
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Insider Attacks in Cloud Compu...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Permanent link
Insider Attacks in Cloud Computing
Bibliographic Details
Main Authors:
Duncan, A
,
Creese, S
,
Goldsmith, M
Format:
Conference item
Published:
IEEE
2012
Holdings
Description
Similar Items
Staff View
Similar Items
Cloud Computing: Insider Attacks on Virtual Machines During Migration
by: Duncan, A, et al.
Published: (2013)
A combined attack-tree and kill-chain approach to designing attack-detection strategies for malicious insiders in cloud computing
by: Duncan, A, et al.
Published: (2019)
Understanding insider threat: a framework for characterising attacks
by: Nurse, J, et al.
Published: (2014)
The attacker in ubiquitous computing environments: formalising the threat model
by: Roscoe, A, et al.
Published: (2003)
Smart insiders: exploring the threat from insiders using the Internet-of-Things
by: Nurse, J, et al.
Published: (2016)