1.
Alani MM. Securing the Cloud: Threats, Attacks and Mitigation Techniques. JACST [Internet]. 2014 Oct. 21 [cited 2024 May 6];3(2):202-13. Available from: https://www.sciencepubco.com/index.php/JACST/article/view/3588