1. Al-Ayyoub. M., Jararweh. Y., Benkhelifa. E., Vouk. M., & Rindos. A. (2015). SDSecurity: a software defined security experimental framework. Proceedings of the 2015 IEEE International Conference onCommunication Workshop (ICCW) (pp. 1871-1876). IEEE.
2. Cloud Computing Security Management, Engineering Systems Management and Its Applications (ICESMA;S. A.Almulla;2010 Second International Conference on Cloud Security,2010
3. Anne Thomas, M. (2008, December 5). Cloud Computing: the Gap between Hype and Reality (Presentation). Proceedings of the Burton Group ECAR Symposium, Boca Raton, FL, USA.
4. Berger, S., Cáceres, R., Goldman, K., Pendarakis, D., Perez, R., Rao, JR., Rom, E., Sailer, R.., Schildhauer, W., Srinivasan, D., Tal, S., & Valdez, E. (2009). Security for the Cloud infrastructure: trusted virtual data center implementation. IBM J. Res. Dev., 53(4), 560–571.