

Publisher: IGI Global_journal
E-ISSN: 1548-7725|19|4|13-21
ISSN: 1548-7717
Source: Journal of Cases on Information Technology (JCIT), Vol.19, Iss.4, 2017-10, pp. : 13-21
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






Intrusion detection system in cloud computing environment
International Journal of Cloud Computing, Vol. 1, Iss. 2-3, 2012-05 ,pp. :

