has been cited by the following article(s):
[1]
|
Mastering Intrusion Detection for Cybersecurity [Working Title]
2025
DOI:10.5772/intechopen.1008756
|
|
|
[2]
|
Evaluating Current Cloud Security Challenges and IAAS Optimization
2024 7th International Conference on Contemporary Computing and Informatics (IC3I),
2024
DOI:10.1109/IC3I61595.2024.10828722
|
|
|
[3]
|
Cloud Security: Analyzing Threats and Challenges
2024 25th International Arab Conference on Information Technology (ACIT),
2024
DOI:10.1109/ACIT62805.2024.10877035
|
|
|
[4]
|
Main Confidentiality Challenges in Network Security: A Literature Review
2024 25th International Arab Conference on Information Technology (ACIT),
2024
DOI:10.1109/ACIT62805.2024.10876902
|
|
|
[5]
|
Resilience-Centric Trust Evaluation in Cloud Computing: A Comparative Assessment of Cloud Trust Evaluation Methods Using the RAA Metric
2024 International Conference on Smart Electronics and Communication Systems (ISENSE),
2024
DOI:10.1109/ISENSE63713.2024.10872061
|
|
|
[6]
|
Factors Contributing to Resistance in Cloud Computing Adoption at a South African Higher Education Institution
2024 4th International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME),
2024
DOI:10.1109/ICECCME62383.2024.10796868
|
|
|
[7]
|
Cloud Computing Security: Threats and Mitigation Strategies
2024 International Conference on Signal Processing and Advance Research in Computing (SPARC),
2024
DOI:10.1109/SPARC61891.2024.10829335
|
|
|