[1]
F. . Jimmy, “Cyber security Vulnerabilities and Remediation Through Cloud Security Tools”, JAIGS, vol. 2, no. 1, pp. 129–171, Apr. 2024.