[1]
M. M. Alani, “Securing the Cloud: Threats, Attacks and Mitigation Techniques”, JACST, vol. 3, no. 2, pp. 202–213, Oct. 2014, doi: 10.14419/jacst.v3i2.3588.