Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security

Cloud technology makes it possible for users to access information from anywhere, all the time, on any device, and that is the major cause of the many different types of assaults. In principle, multiple dangers, including data leakage, information leakage, and unauthorized information accessibility,...

Full description

Saved in:
Bibliographic Details
Published inEAI endorsed transactions on scalable information systems
Main Authors M, Rekha, P, Shoba Rani
Format Journal Article
LanguageEnglish
Published 05.02.2024
Online AccessGet full text

Cover

Loading…