1. Brown, E. (2012). NIST issues cloud computing guidelines for managing security and privacy (pp. 800–144). National Institute of Standards and Technology Special Publication.
2. Fernandes, D. B., et al. (2013). Security issues in cloud environments: A survey. International Journal of Information Security, 12(303), 1–58.
3. Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. London: Wiley.
4. Wang, X., Huang, T.-L., & Liu, X.-Y. (2010). Research on the intrusion detection mechanism based on cloud computing. In Intelligent computing and integrated systems (ICISS), 2010 international conference on.
5. Chi-Chun, L., Chun-Chieh, H., & Ku, J. (2010). A cooperative intrusion detection system framework for cloud computing networks. In Parallel processing workshops (ICPPW), 2010 39th international conference on.