1. Toward trustworthy clouds’ internet scale critical infrastructure;Abbadi,2011
2. Abbadi, I. M., & Lyle, J. (2011). Challenges for provenance in cloud computing. In 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP 11).
3. The utility of offensive cyber-operations in conventional military engagements;Abbott;Australian Army Journal,2018
4. A hybrid hashing security algorithm for data storage on cloud computing;AbdElnapi;International Journal of Computer Science and Information Security (IJCSIS),2016
5. Cloud-native repositories for big scientific data;Abernathey;Computing in Science & Engineering,2021