2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA) 2020
DOI: 10.1109/iceta51985.2020.9379217
|View full text |Cite
|
Sign up to set email alerts
|

Private cloud security architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Out team is working on this research in the field of advanced monitoring of flows and in the evaluation of security events for networks and cloud computing systems. Several articles were published by our team on the topic of CC systems [38], their security architecture [39], the management of cybersecurity incidents and on creating a packet capture infrastructure for creating valuable datasets [40].…”
Section: Motivationmentioning
confidence: 99%
“…Out team is working on this research in the field of advanced monitoring of flows and in the evaluation of security events for networks and cloud computing systems. Several articles were published by our team on the topic of CC systems [38], their security architecture [39], the management of cybersecurity incidents and on creating a packet capture infrastructure for creating valuable datasets [40].…”
Section: Motivationmentioning
confidence: 99%
“…Our team is actively engaged in advanced flow monitoring and assessing security events for both networks and Cloud Computing systems. Numerous articles authored by our team delve into CC systems [4], their security architecture [5], the management of cybersecurity incidents, and the establishment of a packet capture infrastructure to generate valuable datasets [6,7].…”
mentioning
confidence: 99%