z-logo
open-access-imgOpen Access
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment
Author(s) -
D.Usha Sree
Publication year - 2014
Publication title -
international journal of computer applications technology and research
Language(s) - English
Resource type - Journals
ISSN - 2319-8656
DOI - 10.7753/ijcatr0311.1018
Subject(s) - computer science , cloud computing , graph , evasion (ethics) , computer security , theoretical computer science , operating system , immune system , immunology , biology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here