Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Mining user actions with fuzzy related data security conviction in cloud computing
https://iieta.org/sites/default/files/pdf/2019-06/201-212.pdf