Abstract

A model of threats has been proposed that makes it possible to identify potential vulnerabilities of the cloud computing environment, including the actions related to system task scheduler malfunction in a timely manner and, thus, efficiently block information action channels beyond the control of guest operating systems or application software.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call