1. Aarseth, R. (2015). Security in cloud computing and virtual environments [Master's thesis, The University of Bergen].
2. Cybersecurity: Have a game plan: A proactive approach to system management requires diligence, flexibility.;W.Aja;Plant Engineering,2018
3. Alexander, H. (1986). Formally-based tools and techniques for human-computer dialogues.
4. An overview of service models of cloud computing.;I.Ashraf;International Journal of Multidisciplinary and Current Research,2014
5. Protection of Data in Edge and Cloud Computing.;M.Ati;2022 IEEE International Conference on Computing (ICOCO),2022