1.
S.Shobana, P. Jeyamedona, D.Shankar , N. Keerthana , S.Radha Rammohan. Resolving Cloud Vulnerability From Hijacking Using Illegal Security Access And Secure Conformity. IJAST [Internet]. 2020May15 [cited 2020Aug.15];29(12s):1251 -1256. Available from: http://sersc.org/journals/index.php/IJAST/article/view/22606