[1]
“Security, Privacy, Threats and Risks in Cloud Computing ― A Vital Review”, J. Appl. Methods Electron. Comput., vol. 4, no. 1, pp. 31–38, Mar. 2016, doi: 10.18100/ijamec.29177.