Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security
Cloud technology makes it possible for users to access information from anywhere, all the time, on any device, and that is the major cause of the many different types of assaults. In principle, multiple dangers, including data leakage, information leakage, and unauthorized information accessibility,...
Saved in:
Published in | EAI endorsed transactions on scalable information systems |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
05.02.2024
|
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!