1. Depot, T.H.: The home depot reports findings in payment data breach investigation. http://krebsonsecurity.com/2014/09/home-depot-hit-by-same-malware-as-target/ (2014). Accessed 13 Oct 15
2. Pavel, A.: Amazon.com server said to have been used in Sony attack. http://www.bloomberg.com/news/articles/2011-05-13/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server (2011). Accessed 13 Oct 15
3. Cloud Security Alliance: Security research alliance to promote network security. Netw. Secur. 1999(2), 3–4 (1999)
4. Bergmayr, A., Brunelière, H., Izquierdo, J.L.C., Gorroñogoitia, J., Kousiouris, G., Kyriazis, D., Langer, P., Menychtas, A., Orue-Echevarria, L., Pezuela, C., Wimmer, M.: Migrating legacy software to the cloud with ARTIST. In: European Conference on Software Maintenance and Reengineering, CSMR, pp. 465–468 (2013)
5. Ferry, N., Rossini, A., Chauvel, F., Morin, B., Solberg, A.: Towards model-driven provisioning, deployment, monitoring, and adaptation of multicloud systems. In: 6th International Conference on Cloud Computing, pp. 887–894. IEEE Press (2013)