[1]
A. MM and M. Azath, “Survey on Secure Intrusion Detection and Countermeasures in Cloud”, Int. J. Comp. Sci. Eng., vol. 2, no. 12, pp. 94–97, Dec. 2014.