UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT Conference paper
Yaoyang Wu, Simon Fong, Yan Zhuang. General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 134-140.
Authors:  Yaoyang Wu;  Simon Fong;  Yan Zhuang
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Computer Network Security  Security Threats  Sme  
Big data mining algorithms for fog computing Conference paper
Simon Fong. Big data mining algorithms for fog computing[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 57-61.
Authors:  Simon Fong
Favorite | TC[WOS]:4 TC[Scopus]:3 | Submit date:2019/02/13
Computer Network Security  Security Threats  Sme  
A Critical Review of Security Threats in Cloud Computing Conference paper
Mahroosh Irfan, Muhammad Usman, Yan Zhuang, Simon Fong. A Critical Review of Security Threats in Cloud Computing[C]:IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2016, 105-111.
Authors:  Mahroosh Irfan;  Muhammad Usman;  Yan Zhuang;  Simon Fong
Favorite | TC[WOS]:4 TC[Scopus]:13 | Submit date:2019/02/13
Cloud Computing  Cloud Security  Threats  Service Models  Deployment Models