Systematic identification of threats in the cloud: A survey
Computer Networks, pp. 46-69, 2019.
Attack classificationCloud computingThreats classificationThreat identificationVulnerabilities
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those questions provide the necessary information for the security assessment and to implement effective countermeasures. ...More
Full Text (Upload PDF)
PPT (Upload PPT)