1. Evolution of 3C Cyber-Physical Systems Architecture for Industry 4.0.;A.Ahmadi;Proceedings of SOHOMA,2018
2. Ahmed & Elatif. (2015). Network Denial of Service Threat Security on Cloud Computing A Survey. International Journal of Scientific Research in Science, Engineering and Technology, 1(5).
3. A Survey of Big Data Cloud Computing Security.;International Journal of Computer Science and Software Engineering,2014
4. Avizienis, A., Laprie, J., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. EEE Transactions on Dependable and Secure Computing, 1(1), 11–33. doi:10.1109/TDSC.2004.2
5. Introduction to information security foundations and applications;A. I.Awad;Information Security: Foundations, Technologies and Applications,2018