Effective security analysis for combinations of MTD techniques on cloud computing (short paper)

Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard

Research output: Chapter in Book/Conference paperConference paper

11 Citations (Scopus)

Fingerprint Dive into the research topics of 'Effective security analysis for combinations of MTD techniques on cloud computing (short paper)'. Together they form a unique fingerprint.

Mathematics

Engineering & Materials Science