(1)
Alani, M. M. Securing the Cloud: Threats, Attacks and Mitigation Techniques. JACST 2014, 3 (2), 202-213. https://doi.org/10.14419/jacst.v3i2.3588.