[1]
S. M. Othman, A. Y. Al-mutawkkil, and A. M. Alnashi, “Survey of Intrusion Detection Techniques in Cloud Computing”, jast, vol. 2, no. 4, pp. 363–374, Aug. 2024.