ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Cloud Computing Potability with Risk Assessment
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
◽
10.1109/mobilecloud.2016.20
◽
2016
◽
Cited By ~ 5
Author(s):
A. Chopra
◽
P. W. C. Prasad
◽
Abeer Alsadoon
◽
S. H. Ali
◽
A. Elchouemi
Keyword(s):
Risk Assessment
◽
Cloud Computing
Download Full-text
Related Documents
Cited By
References
Cyber Resiliency in the Context of Cloud Computing Through Cyber Risk Assessment
2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA)
◽
10.1109/caida51941.2021.9425195
◽
2021
◽
Author(s):
Hilalah F. Al-Turkistani
◽
Alaa AlFaadhel
Keyword(s):
Risk Assessment
◽
Cloud Computing
◽
Cyber Risk
Download Full-text
Current State of Cloud Computing Risk Assessment in Malaysian Private Sector
Proceedings of the 2020 6th International Conference on Computer and Technology Applications
◽
10.1145/3397125.3397142
◽
2020
◽
Author(s):
Nurbaini Zainuddin
◽
Rasimah Che Mohd Yusuff
◽
Ganthan Narayana Samy
Keyword(s):
Risk Assessment
◽
Cloud Computing
◽
Private Sector
◽
Current State
Download Full-text
Risk Assessment for Emerging Domains (IoT, Cloud Computing, and AI)
10.1109/jeeit53412.2021.9634156
◽
2021
◽
Author(s):
Rama Al Attar
◽
Joyce Al-Nemri
◽
Ahmad Homsi
◽
Abdallah Qusef
Keyword(s):
Risk Assessment
◽
Cloud Computing
Download Full-text
Information Security Risk Assessment Based on Cloud Computing and BP Neural Network
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-43306-2_13
◽
2020
◽
pp. 85-91
Author(s):
Zheng Zhang
Keyword(s):
Neural Network
◽
Risk Assessment
◽
Cloud Computing
◽
Information Security
◽
Bp Neural Network
◽
Security Risk
◽
Information Security Risk
◽
Security Risk Assessment
Download Full-text
A Method of the Cloud Computing Security Management Risk Assessment
Advances in Intelligent and Soft Computing - Advances in Computer Science and Engineering
◽
10.1007/978-3-642-27948-5_81
◽
2012
◽
pp. 609-618
◽
Cited By ~ 4
Author(s):
Hongbing Wang
◽
Feng Liu
◽
Heng Liu
Keyword(s):
Risk Assessment
◽
Cloud Computing
◽
Security Management
◽
Cloud Computing Security
Download Full-text
Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing
International Journal of Information and Computer Security
◽
10.1504/ijics.2019.101907
◽
2019
◽
Vol 11
(4/5)
◽
pp. 315
Author(s):
Ben Charhi Youssef
◽
Mannane Nada
◽
Regragui Boubker
Keyword(s):
Risk Assessment
◽
Cloud Computing
◽
Analysis Approach
◽
Attack Pattern
◽
Behavioural Analysis
Download Full-text
Risk Assessment Methods for Cloud Computing Platforms
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)
◽
10.1109/compsac.2019.00083
◽
2019
◽
Cited By ~ 1
Author(s):
Timothy Weil
Keyword(s):
Risk Assessment
◽
Cloud Computing
◽
Assessment Methods
◽
Computing Platforms
Download Full-text
Risk Assessment Methods for Cloud Computing Platforms
IT Professional
◽
10.1109/mitp.2019.2956257
◽
2020
◽
Vol 22
(1)
◽
pp. 63-66
Author(s):
Timothy Weil
Keyword(s):
Risk Assessment
◽
Cloud Computing
◽
Assessment Methods
◽
Computing Platforms
Download Full-text
A research on the indicator system of Cloud Computing Security Risk Assessment
2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering
◽
10.1109/icqr2mse.2012.6246200
◽
2012
◽
Cited By ~ 7
Author(s):
Jijun Zhang
◽
Dejian Sun
◽
Donghang Zhai
Keyword(s):
Risk Assessment
◽
Cloud Computing
◽
Indicator System
◽
Security Risk
◽
Cloud Computing Security
◽
Security Risk Assessment
Download Full-text
Survey: Risk assessment models for cloud computing: Evaluation criteria
2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech)
◽
10.1109/cloudtech.2017.8284712
◽
2017
◽
Author(s):
Nada Mannane
◽
Youssef Bencharhi
◽
Brahim Boulafdour
◽
Boubker Regragui
Keyword(s):
Risk Assessment
◽
Cloud Computing
◽
Evaluation Criteria
◽
Risk Assessment Models
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close