1. Game theoretic defense approach to wireless networks against stealthy decoy attacks;Anwar,2016
2. Top Threats to Cloud Computing V1.0;Archer,2010
3. A security game model for remote software protection;Basilico,2016
4. Versatile, scalable, and accurate simulation of distributed applications and platforms;Casanova;J. Parallel Distrib. Comput. Elsevier,2014
5. Cloud Security Alliance, CSA Controls Matrix V. 3, https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3/.