Cited By
View all- (2016)A survey of security issues for cloud computingJournal of Network and Computer Applications10.1016/j.jnca.2016.05.01071:C(11-29)Online publication date: 1-Aug-2016
- Zhou FGoel MDesnoyers PSundaram R(2013)Scheduler vulnerabilities and coordinated attacks in cloud computingJournal of Computer Security10.5555/2590624.259062621:4(533-559)Online publication date: 1-Jul-2013
- Benzina H(2012)Towards designing secure virtualized systems2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)10.1109/DICTAP.2012.6215385(250-255)Online publication date: May-2012
- Show More Cited By