1. Hashmi, Ahtisham & Ranjan, Aarushi & Anand, Abhineet. (2018). Security and Compliance Management in Cloud Computing. International Journal of Advanced Studies in Computer Science and Engineering (2278-7917). 7. 47-54. Available at: https://www.researchgate.net/publication/323081755_Security_and_Compliance_Management_in_Cloud_Computing
2. Lakhno, V., Kozlovskii, V., Boiko, Y., Mishchenko, A., & Opirskyy, I. (2017). Management of information protection based on the integrated implementation of decision support systems. Eastern-European Journal of Enterprise Technologies, 5(9 (89), 36–42. DOI: 10.15587/1729-4061.2017.111081
3. V. Susukailo, I. Opirskyy and S. Vasylyshyn, "Analysis of the attack vectors used by threat actors during the pandemic," 2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT), Zbarazh, Ukraine, 2020, pp. 261-264, DOI: 10.1109/CSIT49958.2020.9321897.
4. What is cloud security? Available at: https://www.microsoft.com/uk-ua/security/business/security-101/what-is-cloud-security
5. Vakhula, O., Opirskyy, I., Mykhaylova, O. Research on Security Challenges in Cloud Environments and Solutions based on the security-as-Code Approach, Workshop on Cybersecurity Providing in Information and Telecommunication Systems II, vol. 3550, (2023) 55–69. Available at: https://ceur-ws.org/Vol-3550/