- 已选条件:
-
× security vulnerabilities
1 Cloud Computing Security: A Survey [期刊论文]
来源:Computers , 2014
作者:Issa M. Khalil, Abdallah Khreishah
关键词:cloud computing;cloud security;...
使用许可:CC BY
来源:Proceedings , 2018
作者:Alonso, LucÃa;López, Andrés MarÃn;Patricia Arias Cabarcos,Daniel DÃaz SÃnchez;等
关键词:fitness tracker;wearable devices;...
使用许可:CC BY
来源:Journal of Sensor and Actuator Networks , 2014
作者:Htoo Aung Maw, Hannan Xiao, Bruce Christianson
关键词:wireless sensor networks;access control schemes;...
使用许可:CC BY
来源:Proceedings , 2018
作者:Lucía Alonso;Daniel Díaz Sánchez and Patricia Arias Cabarcos;Florina Almenares Mendoza;等
关键词:fitness tracker;wearable devices;...
使用许可:Unknown
5 Cloud Computing Security: A Survey [期刊论文]
来源:Computers , 2014
作者:Muhammad Azeem, Abdallah Khreishah, Issa M. Khalil
关键词:cloud computing;cloud security;...
使用许可:Unknown