1. Turab, N. M., Abu, A., & Shadi, T. (2013). Cloud computing challenges and solutions. International Journal of Computer Networks & Communications (IJCNC), 5(5), 209–216.
2. Lock, H.-Y. (2012). InfoSec reading room. Reading.
3. Raghav, I. (2013). Intrusion detection and prevention in cloud environment: A systematic review. International Journal of Computer Applications, 68(24), 7–11.
4. Mahalakshmi, B., & Suseendran, G. (2016, July). Effectuation of secure authorized deduplication in hybrid cloud. Indian Journal of Science and Technology, 9(25).
5. Amudhavel, J., et al. (2016). A survey on Intrusion Detection System: State of the art review. Indian Journal of Science and Technology, 9(11), 1–9.