M, Rekha and P, Shoba Rani (2024) Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security. EAI Endorsed Transactions on Scalable Information Systems.
70612.pdf
Download (1MB)
Abstract
Cloud technology makes it possible for users to access information from anywhere, all the time, on any device, and that is the major cause of the many different types of assaults. In principle, multiple dangers, including data leakage, information leakage, and unauthorized information accessibility,
| Item Type: | Article |
|---|---|
| Date Deposited: | 04 Mar 2026 18:11 |
| Last Modified: | 11 Apr 2026 00:27 |
| URI: | http://eprints.eai.eu/id/eprint/51548 |
