[1]
Alani, M.M. 2014. Securing the Cloud: Threats, Attacks and Mitigation Techniques. Journal of Advanced Computer Science & Technology (JACST). 3, 2 (Oct. 2014), 202–213. DOI:https://doi.org/10.14419/jacst.v3i2.3588.