Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About
About Journal
Archives
Editorial Team
Submissions
Announcements
contact
Login
Register
Search
Home
/
Computer Science
/
Cyber Security
Cyber Security
2 Items
Cyber Security
All Items
Survey of Intrusion Detection Techniques in Cloud Computing
Suad Mohammed Othman, Adnan Yehia Al-mutawkkil, Amani Mohammed Alnashi
363-374
Abstract views:
151
Survey on Cloud Computing Security
Fatima Ismail ALhadi, Nagi Ali AL-Shaibany, Sharaf Abdulhak AL-Homdyl
381-390
Abstract views:
125
Information
For Readers
For Authors
For Librarians
Language
العربية
English
Browse
Categories
Agriculture and agricultural engineering
Engineering
Mechanical Engineering
Automobile Engineering
Production Engineering
Industrial Engineering
Civil Engineering
Electrical Engineering
Computer Engineering
Electronic Engineering
Chemical Engineering
Natural Sciences
Computer Science
Algorithm Design and Optimization
Machine Learning and Data Science
Computer Networks
Micro processing and Interfacing
Web Development
Firmware development
Standalone software development
Information Theory and Coding
Artificial Intelligence
Database
Software Engineering
Data mining
Cloud Computing
Information Security
Cyber Security
physics
Nuclear Physics
Optical physics
Laser physics
Solid state physics
Plasma physics
Energy physics
theoretical physics
Materials Science Physics
chemistry
Analytical chemistry
organic chemistry
Inorganic Chemistry
physical chemistry
Biochemistry
biology
Botany
Zoology
Microbiology
Mathematics
History Workflow
Time to first decision: 7 days
Review time: 45 days
Submission to acceptance: 65 days
Article publishing charge: 100$ for researchers from outside Yemen and 30,000 YR for researchers from within Yemen.
Keywords
Make a Submission
Make a Submission