中图分类
执行
    中文(共1篇) 外文(共166篇)
    排序:
    导出 保存至文件
    [机翻] 设计云取证支持服务(CFeS)的框架
    摘要 : Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics a... 展开

    [期刊]   Alex, M. Edington   Kishore, R.   《Computers and Electrical Engineering》    2017年60卷      共13页
    摘要 : The popularity of cloud computing has been on the rise in recent years, as cloud resources are not only shared by many users but can be allocated on demand. A recent survey reports success of the cyber criminals in using cloud com... 展开

    摘要 : The challenges of cloud forensics have been well-documented by both researchers and government agencies (e.g., U.S. National Institute of Standards and Technology), although many of the challenges remain unresolved. In this articl... 展开

    [期刊]   Alqahtany, Saad   Clarke, Nathan   Furnell, Steven   Reich, Christoph   《Cluster computing》    2016年19卷1期      共15页
    摘要 : Cloud computing is a promising next-generation computing paradigm that offers significant economic benefits to both commercial and public entities. Furthermore, cloud computing provides accessibility, simplicity, and portability f... 展开

    摘要 : Cloud storage services are popular with both individuals and businesses as they offer cost-effective, large capacity storage and multi-functional services on a wide range of devices such as personal computers (PCs), Mac computers,... 展开

    [机翻] 移动云环境下最先进的取证技术:综述、挑战和趋势
    摘要 : Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the ... 展开

    摘要 : The increasing use of smartphones and cloud storage apps allows users to access their data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted by criminals, such devices are an important source of ... 展开

    摘要 : Cloud forensics earn more and more ground as the number of incidents in cloud environments raise daily. Software engineers seek solutions in order to elicit and model cloud forensic requirements, thus implementing software systems... 展开

    摘要 : In today's Internet-connected world, mobile devices are increasingly used to access cloud storage services, which allow users to access data anywhere, anytime. Mobile devices have, however, been known to be used and/or targeted by... 展开

    摘要 : Cloud computing has been adopted by a wide variety of businesses and organisations to give services to customers in a secure and certified manner, protecting cloud providers from fraudulent actions. To investigate cloud-based cybe... 展开

    研究趋势
    相关热图
    学科分类