Intrusion damage assessment for multi-stage attacks for clouds

Junaid Arshad*, Imran Ali Jokhio, Mahmood Shah

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Original languageEnglish
    Title of host publicationEmerging Trends and Applications in Information Communication Technologies - Second International Multi Topic Conference, IMTIC 2012, Proceedings
    Pages132-143
    Number of pages12
    DOIs
    Publication statusPublished (VoR) - 2012
    Event2nd International Multi Topic Conference, IMTIC 2012 - Jamshoro, Pakistan
    Duration: 28 Mar 201230 Mar 2012

    Publication series

    NameCommunications in Computer and Information Science
    Volume281 CCIS
    ISSN (Print)1865-0929

    Conference

    Conference2nd International Multi Topic Conference, IMTIC 2012
    Country/TerritoryPakistan
    CityJamshoro
    Period28/03/1230/03/12

    Keywords

    • Cloud Computing
    • Cloud Computing Security
    • Intrusion Damage Assessment
    • Multi-stage Attacks

    Fingerprint

    Dive into the research topics of 'Intrusion damage assessment for multi-stage attacks for clouds'. Together they form a unique fingerprint.

    Cite this