Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods Conference Paper uri icon

publication date

  • October 1, 2012

published in

  •  

start page

  • 185

end page

  • 190