1. Natalie Boyd (2018) 11 Critical Cloud Security Vulnerabilities [online] 27 July. https://www.sdxcentral.com/cloud/definitions/11-critical-cloud-security-vulnerabilities/ (Accessed 16th July 2019)
2. Rajendran PK, Muthukumar B, Nagarajan G (2015) Hybrid intrusion detection system for private cloud: a systematic approach. Procedia Comput Sci 48:325–329
3. J. Lee, M. Park, J. Eom and T. Chung, "Multi-level Intrusion Detection System and log management in Cloud Computing," 13th International Conference on Advanced Communication Technology (ICACT2011), Seoul, 2011, pp. 552–555
4. D. R. Rani and G. G. Kumari, "A framework for detecting anti-forensics in cloud environment," 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 1277-1280
5. Chao Gong and K. Sarac, "IP traceback based on packet marking and logging," IEEE International Conference on Communications, 2005. ICC 2005. 2005, Seoul, 2005, pp. 1043–1047 Vol. 2