您当前的位置:
首页 >
文章列表页 >
Worm propagation modeling in cloud security
Papers | 更新时间:2024-06-05
    • Worm propagation modeling in cloud security

    • Journal on Communications   Vol. 33, Issue 4, Pages: 17-24(2012)
    • DOI:1000-436X(2012)04-0017-08    

      CLC: TP309
    • Online First:2012-04

      Published:25 April 2012

    移动端阅览

  • Wei ZHANG, Ru-chuan WANG, Peng LI. Worm propagation modeling in cloud security[J]. Journal on Communications, 2012, 33(4): 17-24. DOI: 1000-436X(2012)04-0017-08.

  •  
  •  

0

Views

957

下载量

7

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Influence maximization algorithm based on social network
Research on data encryption system and technology for cloud storage
Research on technology of data encryption and search based on access broker
TCCL:secure and efficient development of desktop cloud structure
Using deep learning for detecting BotCloud

Related Author

Yu ZHANG
Junfeng ZHOU
Ziyang CHEN
Xuan WANG
Peiyi HAN
Chuanyi LIU
Jiahui WANG
Shaoming DUAN

Related Institution

School of Information Management, Shanghai Lixin University of Accounting and Finance
School of Computer Science and Technology, Donghua University
School of Cyberspace Security, Beijing University of Posts and Telecommunications
Department of Information and Security, The State Information Center
Cyberspace Security Research Center, Peng Cheng Laboratory
0