Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights.

Autor: Zineddine, Mhamed1 z5868@yahoo.com
Zdroj: Computers & Security. Feb2015, Vol. 48, p1-18. 18p.
Databáze: Business Source Ultimate