Systematic identification of threats in the cloud: A survey
Computer Networks, pp. 46-69, 2019.
EI
Keywords:
Attack classificationCloud computingThreats classificationThreat identificationVulnerabilities
Abstract:
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those questions provide the necessary information for the security assessment and to implement effective countermeasures. ...More
Code:
Data:
Tags
Comments