1. Rashid, A., Chaturvedi, A.: Cloud computing characteristics and services: a brief review. Int. J. Comput. Sci. Eng. 7, 421–426 (2019)
2. Cloud Security Alliance top threats working group: Cloud computing top threats in 2013—csa (2013, Feb). https://cloudsecurityalliance.org/artifacts/the-notorious-nine-cloud-computing-top-threats-in-2013/. Retrieved: Dec 2023
3. Cloud Security Alliance top threats working group: ‘The treacherous twelve’ cloud computing top threats in 2016—csa (2016, Feb). https://cloudsecurityalliance.org/artifacts/the-treacherous-twelve-cloud-computing-top-threats-in-2016/. Retrieved: Dec 2023
4. Cloud Security Alliance top threats working group: Top threats to cloud computing: egregious eleven—csa (2019, Aug). https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven/. Retrieved: Dec 2023
5. Cloud Security Alliance—top threats working group: Top threats to cloud computing—pandemic eleven (2022). https://cloudsecurityalliance.org/research/working-groups/top-threats/. Retrieved: Dec 2022