Citations in impact factor journals
Cloud based image color transfer and storage in encrypted
domain Multimedia Tools and Applications |
Citation to this article as recorded by
Elastic Security for Autonomic Computing Using Intelligent Algorithm EAI/Springer Innovations in Communication and Computing |
A quantitative assessment of security risks based on a multifaceted classification approach International Journal of Information Security |
Threat modeling of Internet of Things health devices Journal of Applied Security Research |
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems ACM Computing Surveys Vol. 53, Issue 2, 1, 2020 |
How to Obtain Common Criteria Certification of Smart TV for Home
IoT Security and Reliability Symmetry Vol. 9, Issue 10, 233, 2017 |
Modern Principles, Practices, and Algorithms for Cloud Security Advances in Information Security, Privacy, and Ethics |
Security- and Privacy-Aware Computing in Cloud With User Mobility Research Anthology on Privatizing and Securing Data |
How to cite this article
A. Amini, N. Jamil, A. R. Ahmad and M. R. Z`aba, 2015. Threat Modeling Approaches for Securing Cloud Computin. Journal of Applied Sciences, 15: 953-967.
DOI: 10.3923/jas.2015.953.967
URL: https://scialert.net/abstract/?doi=jas.2015.953.967
DOI: 10.3923/jas.2015.953.967
URL: https://scialert.net/abstract/?doi=jas.2015.953.967