[1]
“Cloud Computing Security: Threats, Risks, and Mitigation Techniques”, IJARCST, vol. 3, no. 4, pp. 3388–3393, Jul. 2020, doi: 10.15662/IJARCST.2020.0304001.