Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2017, Volume 9, Issue No 3
Author(s): Iman El Mir, El Mehdi Kandoussi, Mohamed Hanin, Abdelkrim Haqiq, Dong Seong Kim
Keyword(s): Cloud Computing security, VM migration, Attack Graph, Game Theory, Nash equilibrium