Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper)
Crossref DOI link: https://doi.org/10.1007/978-3-319-72359-4_32
Published Online: 2017-12-08
Published Print: 2017
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Alavizadeh, Hooman http://orcid.org/0000-0002-0033-6706
Kim, Dong Seong http://orcid.org/0000-0003-2605-187X
Hong, Jin B. http://orcid.org/0000-0003-1359-3813
Jang-Jaccard, Julian http://orcid.org/0000-0002-1002-057X
License valid from 2017-01-01