[1]
Ajay N, “A Systematic and Comprehensive Review of Literature on Security Threats, Mitigation Strategies and Optimization Techniques in Cloud Computing”, Int J Intell Syst Appl Eng, vol. 12, no. 4, pp. 4497–4512, Jun. 2024.