1. Buyya, R., Broberg, J., Goscinski, A.M. (eds.): CC: Principles and paradigms. Wiley (2010)
2. Data and infrastructure security auditing in CC environments;Rasheed H;Int. J. Inf. Manag.,2014
3. Jamsa, K.: CC. Jones & Bartlett Learning (2022)
4. CC characteristics and services: a brief review;Rashid A;Int. J. Comput. Sci. Eng.,2019
5. Vinolia, A., Kanya, N., Rajavarman, V.N.: Machine Learning and Deep Learning based Intrusion Detection in Cloud Environment: A Review. In 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 952–960). IEEE. (2023), January