References
[1] Vahid Ashktorab and Seyed Reza Taghizadeh, Security Threats and Countermeasuresin Cloud Computingǁ, International Journal of Application or Innovation in Engineering and Management (IJAIEM), Volume 1, Issue 2, October 2018.
[2] Cloud Security Alliances, ―Top Threats to Cloud Computing V1.0ǁ, Cloud Security Alliances, Version 1, Page No. 3, March 2017.
[3] Wiiliam R Claycomb and Alex Nicoll,InsiderThreatstoNewResearchChallengesǁ,CERT. Wayne A. Janssen, Cloud Hooks: Security and Privacy Issues in Cloud Computing , 44th Hawaii International Conference on System Sciences, January 2015.
[4] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and MateiZahria, A view of Cloud Computingǁ, Communications of the ACM, Volume 53, Issue 4, April 2016.
[5] E. Kirda, C. Kruegel and G. Vigna, Cross- Site Scripting Prevention with Dynamic Data Tainting and Static Analysisǁ, Proceeding of the Network and Distributed System. 2014. Mayas Publication 24 Emperor Journal of Applied Scientific Research
[6] Shengmei Luo, Zhaoji Lin, Xiaohua Chen, Zhuolin Yang and JianyongChen,Virtualization Security for Cloud Computing Servicesǁ,International Conference on Cloud and Service Computing, December 2011.
[7] Albert B Jeng, Chien Chen Tseng, Der-Feng Tseng and Jiunn-Chin Wang, A Study of CAPTCHA and its Application to user Authenticationǁ, Proceedingof2ndInternationalConferenceonComputational Collective Intelligence: Technologies and Applications, 2010.
[8] A. Liu, Y. Yuan and A Stavrou, ǁSQLProb:A Proxybased Architecture toward Preventing SQL Injection Attacksǁ, SAC, March 2009.
[9] D. Gollmann, Securing Web Applicationsǁ, Information Security Technical Report, Volume 13, Issue 1, 2008 153.
[10] ZouheirTrabelsi, Hamza Rahmani, Kamel Kaouech and Mounir Frikha, Malicious Sniffing System Detection Platformǁ, Proceedings of the 2004 International Symposium on Applications and the Internet, 2004.
[11] Flavio Lombardi and Roberto di Pietro, Secure Virtualization for Cloud Computingǁ, Journal of Network and Computer Applications, Academic Press Ltd. London, UK, Volume 34, Issue 4, July 2011.
[12] Hanqian Wu, Yi Ding, Winer C. and Li Yao,ǁNetwork Security for Virtual Machine in Cloud Computingǁ, 5th International Conference Information Technology, Seoul, December 2010.
[13] SAVVIS, Securing the Cloud A Review of Cloud ComputingSecurity Implications and Best Practicesǁ, VMWARE WHITE PAPER, SAVVIS.
[14] Ruiping Lua and Kin Choong Yow, Mitigating DDoS Attacks with Transparent and Intelligent Fast-Flux Swarm Networkǁ, IEEE Network, Volume 25, Number 4, August 2011.
[15] Ramaiah, Y. Govinda, and G. VijayaKumari. "Efficient public key homomorphic encryption over integer plaintexts." Information Securityand Intelligence Control (ISIC), 2012 International Conference on. IEEE, 2012.