Effective security analysis for combinations of MTD techniques on cloud computing (short paper)

Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard

Research output: Chapter in Book/Conference paperConference paperpeer-review

16 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Effective security analysis for combinations of MTD techniques on cloud computing (short paper)'. Together they form a unique fingerprint.

Computer Science