1. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63(2), 561–592 (2013)
2. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)
3. Karthikeyan, R., Sundaravadivazhagan, B., Cyriac, R., Balachandran, P.K., Shitharth, S.: Preserving resource handiness and exigency-based migration algorithm (PRH-EM) for energy efficient federated cloud management systems. Mob. Inf. Syst. 2023, 1–11 (2023)
4. NVD: National vulnerability database-search and statistics. https://nvd.nist.gov/vuln/data-feeds, lastchecked = 20.12.2022
5. Modi, C.N., Acha, K.: Virtualization layer security challenges and intrusion detection / prevention systems in cloud computing: a comprehensive review. J. Supercomput. 73(3), 1192–1234 (2017)