[1] A. Bahadur and A. Sadeghi, "Security in cloud computing based on network security based on intelligent methods," Applied Science Studies in Engineering, pp. 65-74, 2019.
[2] N. Mansoori and B. Mohammad Hassanizadeh, and R. Ghafari "Security-based work scheduling algorithm using particle swarm optimization technique and multiple adaptive learning to improve security in cloud computing environment" Electronic and Cyber Defense 159-178 pp, 2019.
[3] J. Michael Brook, A . Stone Getsin, and M. Roza, “Top Threats to Cloud Computing”2022
[4]I. Kanwal, H. Shafi, S. Memon, and M. H. Shah, "Cloud computing security challenges: A review," in Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, pp. 459-469, Springer, January 2021.
[5]A. G. Prabhu, A. Narayanan, and C. Kurian, "A Study on Security ISSUES in SaaS Cloud Computing," 2021.
[6] H. P. Singh, R. Singh, and V. Singh, "Cloud computing security issues, challenges and solutions," Easy Chair, pp. 2516-2314, 2020.
[7] A. Kumar and K. A. Kumar, "A Survey on Cloud Computing Security Threats, Attacks and Countermeasures: A Review," International Journal of Human Computations & Intelligence, vol. 1, no. 3, pp. 13-18, 2022.
[8] N. B. Muhammad and M. Bazzi, "Advances in Cloud Computing: Security Issues and Challenges in the Cloud," in 2022 5th International Conference on Information and Computer Technologies (ICICT), 2022: IEEE, pp. 110-116.
[9] A. H. Shaikh and B. Meshram, "Security issues in cloud computing," in Intelligent Computing and Networking: Proceedings of IC-ICN 2020, Springer, pp. 63-77, 2021.
[10] I. Indu, P. R. Anand, and V. Bhaskar, "Identity and access management in cloud environment: Mechanisms and challenges," Engineering science and technology, an international journal, vol. 21, no. 4, pp. 574-588, 2018.
[11] A. Sunyaev and A. Sunyaev, "Cloud computing," Internet Computing: Principles of Distributed Systems and Emerging Internet-Based Technologies, pp. 195-236, 2020.
[12] v. Shahi and M. Naqvi, "Investigation and evaluation of new models of data security in cloud computing," Non-functional Defense Quarterly, vol. 8, no. 2, pp. 35-42, 2017.
[13] K. Abbas, "DDoS Survey and Arrangements," 2019.
[14] P. Kumar, "Cloud computing: threats, attacks and solutions," International Journal of Emerging Technologies in Engineering Research (IJETER), vol. 4, no. 8, pp. 24-28, 2016.
[15] D. Stiawan, M. E. Suryani, M. Y. Idris, M. N. Aldalaien, N. Alsharif, and R. Budiarto, "Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network," IEEE Access, vol. 9, pp. 116475-116484, 2021.
پایگاههای اینترنتی:
[16]
A Comprehensive Guide to Cloud Security in 2023 (Risks, Best Practices, Certifications)
Edward Jones, October 28, 2022.
[19] What is a cloud firewall? What is firewall-as-a-service (FWaaS)? https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/