1. Suryateja, P.S.: Threats and vulnerabilities of cloud computing a review. Int. J. Comput. Sci. Eng. 6(3), 297–302 (2018)
2. Rhodes-Ousley, M.: Information Security the Complete Reference, 2nd edn. The McGraw-Hill, New York (2013)
3. Lytinen, S., Railsback, S.: The evolution of agent-based simulation platforms - a review of NetLogo 5.0 and ReLogo. In: Proceedings of the Fourth International Symposium on Agent-Based Modeling and Simulation (21st European Meeting on Cybernetics and Systems Research [EMCSR 2012]) (2012)
4. Railsback, S., Lytinen, S., Jackson, S.: Agent-based simulation platforms: review and development recommendations. Railsback Associat. (2006). https://doi.org/10.1177/0037549706073695
5. Lecture Notes in Computer Science;S Kent,2002