[1]
“Survey of Intrusion Detection Techniques in Cloud Computing”, jast, vol. 2, no. 4, pp. 363–374, Sep. 2024, doi: 10.59628/jast.v2i4.970.