[1]
J. singh and M. Kumar, “Review of Different Security Assessment Models Using in Cloud Environment”, theijst, vol. 4, no. 10, Oct. 2016.