1.
Hossein Shariati. Identify Abnormal System Behaviors to Improve Security in Evolutionary Algorithm-Based Cloud Computing. IJAST [Internet]. 2020May1 [cited 2024May2];29(06):5458 -5471. Available from: http://sersc.org/journals/index.php/IJAST/article/view/19615