[1]
S.Shobana, P. Jeyamedona, D.Shankar , N. Keerthana , S.Radha Rammohan, “Resolving Cloud Vulnerability From Hijacking Using Illegal Security Access And Secure Conformity”, IJAST, vol. 29, no. 12s, pp. 1251 - 1256, May 2020.