ALANI, Mohammed M. Securing the Cloud: Threats, Attacks and Mitigation Techniques. Journal of Advanced Computer Science & Technology (JACST), [S. l.], v. 3, n. 2, p. 202–213, 2014. DOI: 10.14419/jacst.v3i2.3588. Disponível em: https://sciencepubco.com/index.php/JACST/article/view/3588.. Acesso em: 24 nov. 2024.