Major Vulnerabilities and Their Prevention Methods in Cloud Computing
Crossref DOI link: https://doi.org/10.1007/978-981-13-1882-5_2
Published Online: 2018-12-12
Published Print: 2019
Update policy: https://doi.org/10.1007/springer_crossmark_policy
John, Jomina
Norman, Jasmine
Text and Data Mining valid from 2018-12-12