[1]
H. Shaheen, S. V. Kumar, S. Vidhya, K. Ravikumar, S. Girirajan, and R. Senthilkumar, “Security on Cloud Resource Consumption of Malicious Attacks – A Systematic Review”, JTDE, vol. 14, no. 1, pp. 46–67, Mar. 2026, doi: 10.18080/jtde.v14n1.1234.