لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Vasfi Varzande, Behrouz & Shahram Nasiri, 3131, An Overview On ...
Degoulet, Patrice. "Hospital information systems." Medical Informatics, e-Health. Springer Paris, ...
Masrom, M., & Rahimli, A. (2014). A Review of Cloud ...
Bamiah, M., Brohi, S., & Chuprat, S. (2012, December). A ...
Winter, A., & Haux, R. (1995). A three-level graph-based model ...
Kumar, S. N., & Vajpayee, A. (2016). A Survey on ...
Boonstra, A., & Broekhuis, M. (2010). Barriers to the acceptance ...
Adueni, I. A. B., Hayfron- Acquah, J. B., & Panford, ...
Ekonomou, E., Fan, L., Buchanan, W., & Thuemmler, C. (2011, ...
Abayomi-Alli, A. A., Ikuomola, A. J., Robert, I. S., & ...
Archenaa, J., & Anita, E. M. (2015). A survey of ...
Ahuja, S. P., Mani, S., & Zambrano, J. (2012). A ...
Raghupathi, W., & Raghupathi, V. (2014). Big data analytics in ...
Babu, R., & Jayashree, K. (2015). A Survey on the ...
Wooten, R., Klink, R., Sinek, F., Bai, Y., & Sharma, ...
Delgado, M. (2011, July). The evolution of health care it: ...
Adueni, I. A. B., Hayfron- Acquah, J. B., & Panford, ...
Guide for Conducting Risk Assessments. (2012). NIST Special Publication 800-30 ...
Ganthan Narayana Samy, Rabiah Ahmad, & Zuraini Ismail (2009). Threats ...
Arunabha Mu khopadhyay _ Samir Chatterjee _ Debashis Saha , ...
Mary Sumner (2009). Information Security Threats: A Comparative Analysis of ...
Ajit Appari , & M. Eric Johnson. (2008). Information Security ...
Grobauer B, Walloschek T, Stocker E (2011) Understanding Cloud Computing ...
Cloud Security Alliance (2010) Top Threats to Cloud Computing V1.0. ...
ENISA (2009) Cloud Computing: benefits, risks and re co mmendations ...
OWASP (2010) The Ten most critical Web application Security risks. ...
Reuben JS (2007) A Survey on virtual machine Security. Seminar ...
http ://www.tml.tk. fi/Pub lications/C/2 5 /p ap e rs/Reuben_fina I.pdf. ...
Wu H, Ding Y, Winer C, Yao _ (2010) Network ...
Jasti A, Shah P, Nagaraj R, Pendse R (2010) Security ...
Reddy, V. K., & Reddy, D. P. T. (2015). A ...
B AL AS UB RAMANIAN, V. et MALA T. A ...
SUBASHINI, Subashini et KAVITHA, V. A survey on security issues ...
REDDY, V. Krishna, RAO, B. Thirumala, et REDDY, L. S. ...
KUMAR, Sarvesh, SINGH, Suraj Pal, SINGH, Ashwanee Kumar, _ al. ...
SABAHI, Farzad. Secure Virtualization for Cloud Environment Using Hypervisor -based ...
نمایش کامل مراجع