1. TOP 10 PREDICTIONS, IDC Predictions 2013: Competing on the 3rd Platform.
http://www.idc.com/research/Predictions13/downloadable/238044.pdf
2. Tanzim Khorshed, Md., Shawkat Ali, A.B.M., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)
3. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
4. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
5. Lee, J.-H., Park, M.-W., Chung, T.-M.: Multi-level intrusion detection system and log management in cloud computing. In: 13th Interntional Conference on Advanced Communication Technology (ICACT), Seoul, pp. 552–555 (2011)