[1]
Hossein Shariati, “Identify Abnormal System Behaviors to Improve Security in Evolutionary Algorithm-Based Cloud Computing”, IJAST, vol. 29, no. 06, pp. 5458 - 5471, May 2020.