2022 5th International Conference on Contemporary Computing and Informatics (IC3I) 2022
DOI: 10.1109/ic3i56241.2022.10072727
|View full text |Cite
|
Sign up to set email alerts
|

Various Threats and Attack on Cloud Computing: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…By manipulating SQL queries, SQL injection attacks can achieve malicious objectives. Consequently, sensitive data may be modified unauthorized, confidential details may be accessed, or the server may crash due to such manipulation [124].…”
Section: ) the Cloud Layermentioning
confidence: 99%
“…By manipulating SQL queries, SQL injection attacks can achieve malicious objectives. Consequently, sensitive data may be modified unauthorized, confidential details may be accessed, or the server may crash due to such manipulation [124].…”
Section: ) the Cloud Layermentioning
confidence: 99%