Insider Attacks in Cloud Computing
Main Authors: | Duncan, A, Creese, S, Goldsmith, M |
---|---|
Format: | Conference item |
Published: |
IEEE
2012
|
Similar Items
-
Cloud Computing: Insider Attacks on Virtual Machines During Migration
by: Duncan, A, et al.
Published: (2013) -
A combined attack-tree and kill-chain approach to designing attack-detection strategies for malicious insiders in cloud computing
by: Duncan, A, et al.
Published: (2019) -
Understanding insider threat: a framework for characterising attacks
by: Nurse, J, et al.
Published: (2014) -
The attacker in ubiquitous computing environments: formalising the threat model
by: Roscoe, A, et al.
Published: (2003) -
Smart insiders: exploring the threat from insiders using the Internet-of-Things
by: Nurse, J, et al.
Published: (2016)