1.
Ajay N. A Systematic and Comprehensive Review of Literature on Security Threats, Mitigation Strategies and Optimization Techniques in Cloud Computing. Int J Intell Syst Appl Eng [Internet]. 2024 Jun. 12 [cited 2026 Jan. 30];12(4):4497-512. Available from: https://www.ijisae.org/index.php/IJISAE/article/view/7139