ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Cloud Computing Privacy Security Risk Analysis and Evaluation
Recent Patents on Computer Science
◽
10.2174/2213275910666171012151829
◽
2017
◽
Vol 10
◽
Author(s):
Rong Jiang
Keyword(s):
Cloud Computing
◽
Risk Analysis
◽
Security Risk
◽
Analysis And Evaluation
Download Full-text
Related Documents
Cited By
References
Cloud Computing Privacy Security Risk Analysis and Evaluation
Recent Patents on Computer Science
◽
10.2174/2213275911666180719121041
◽
2018
◽
Vol 11
(1)
◽
pp. 32-43
Author(s):
Qiujin Zhang
◽
Rong Jiang
◽
Tong Li
◽
Zifei Ma
◽
Ming Yang
◽
...
Keyword(s):
Cloud Computing
◽
Risk Analysis
◽
Security Risk
◽
Analysis And Evaluation
Download Full-text
Security risk analysis and evaluation
2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577)
◽
10.1109/icc.2004.1312850
◽
2004
◽
Cited By ~ 6
Author(s):
F. Harmantzis
◽
M. Malek
Keyword(s):
Risk Analysis
◽
Security Risk
◽
Analysis And Evaluation
Download Full-text
Research on Information Security Risk Analysis and Prevention Technology of Network Communication Based on Cloud Computing Algorithm
Journal of Physics Conference Series
◽
10.1088/1742-6596/1982/1/012129
◽
2021
◽
Vol 1982
(1)
◽
pp. 012129
Author(s):
Yonghong Li
◽
Ruifeng Liu
◽
Xiaoyu Liu
◽
Hong Li
◽
Qingwen Sun
Keyword(s):
Cloud Computing
◽
Information Security
◽
Risk Analysis
◽
Network Communication
◽
Security Risk
◽
Computing Algorithm
◽
Information Security Risk
Download Full-text
Cyber security risk analysis and evaluation for intelligent vehicle gateway
10.1117/12.2613656
◽
2021
◽
Author(s):
Hao Zhao
◽
Jiansheng Guo
◽
Zhi Wu
◽
Tianyu Liu
Keyword(s):
Risk Analysis
◽
Cyber Security
◽
Intelligent Vehicle
◽
Security Risk
◽
Analysis And Evaluation
Download Full-text
Notice of Violation of IEEE Publication Principles: Security risk analysis for cloud computing systems
Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems
◽
10.1109/idaacs.2011.6072868
◽
2011
◽
Cited By ~ 3
Author(s):
Vadym Mukhin
◽
Artem Volokyta
Keyword(s):
Cloud Computing
◽
Risk Analysis
◽
Security Risk
◽
Computing Systems
Download Full-text
A Method of Simplifying the Asset Dependency Cycle in Security Risk Analysis
IOP Conference Series Materials Science and Engineering
◽
10.1088/1757-899x/1077/1/012002
◽
2021
◽
Vol 1077
(1)
◽
pp. 012002
Author(s):
Edri Yunizal
◽
Judhi Santoso
◽
Kridanto Surendro
Keyword(s):
Risk Analysis
◽
Security Risk
Download Full-text
Implementation and comparison of machine learning classifiers for information security risk analysis of a human resources department
2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)
◽
10.1109/cisim.2010.5643665
◽
2010
◽
Author(s):
Mete Eminagaoglu
◽
Saban Eren
Keyword(s):
Machine Learning
◽
Information Security
◽
Risk Analysis
◽
Human Resources
◽
Security Risk
◽
Machine Learning Classifiers
◽
Learning Classifiers
◽
Information Security Risk
Download Full-text
Cyber Security Risk Analysis for a Virtual Assistant G2C Digital Service Using FAIR Model
10.1109/icedeg52154.2021.9530938
◽
2021
◽
Author(s):
Richard Dreyling
◽
Eric Jackson
◽
Ingrid Pappel
Keyword(s):
Risk Analysis
◽
Cyber Security
◽
Security Risk
◽
Digital Service
Download Full-text
Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud Computing Case Study
Handbook of Computer Networks and Cyber Security
◽
10.1007/978-3-030-22277-2_3
◽
2020
◽
pp. 63-90
Author(s):
Mouna Jouini
◽
Latifa Ben Arfa Rabai
Keyword(s):
Cloud Computing
◽
Information Systems
◽
Risk Analysis
◽
Analysis Models
Download Full-text
Data Security Risk and Preventive Measures of Virtual Cloud Server Based on Cloud Computing
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-43306-2_6
◽
2020
◽
pp. 40-45
Author(s):
Ping Xia
Keyword(s):
Cloud Computing
◽
Data Security
◽
Preventive Measures
◽
Security Risk
◽
Cloud Server
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close