Threat Modeling Approaches for Securing Cloud Computin
Crossref DOI link: https://doi.org/10.3923/jas.2015.953.967
Published Print: 2015-06-15
Update policy: https://doi.org/10.3923/crossmark-policy
Amini, A.
Jamil, N.
Ahmad, A.R.
Z`aba, M.R.