1.
Ajay N. A Systematic and Comprehensive Review of Literature on Security Threats, Mitigation Strategies and Optimization Techniques in Cloud Computing. Int J Intell Syst Appl Eng [Internet]. 2024 Jun. 12 [cited 2025 Sep. 11];12(4):4497-512. Available from: https://ijisae.org/index.php/IJISAE/article/view/7139