Systematic identification of threats in the cloud: A survey

Computer Networks, pp. 46-69, 2019.

Cited by: 15|Bibtex|Views13|Links
EI
Keywords:
Attack classificationCloud computingThreats classificationThreat identificationVulnerabilities

Abstract:

When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those questions provide the necessary information for the security assessment and to implement effective countermeasures. ...More

Code:

Data:

Your rating :
0

 

Tags
Comments