[1]
T. K. et al., “Cloud computing network security for various parameters, and its application”, IJAST, vol. 28, no. 20, pp. 897 - 904, Jan. 2020.