Search for persons
X
?
Lecture Notes in Computer Science; Information and Operational Technology Security Systems ,
2
Threat Modeling the Cloud: An Ontology Based Approach:
, In:
?
Lecture Notes in Computer Science; Information and Operational Technology Security Systems ,
3
Protecting Cloud-Based CIs: Covert Channel Vulnerabilities ..:
, In:
?
Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility ,
12