[1]
Dwi Kurnia Wibowo, Ahmad Luthfi, and Nur Widiyasono, “Investigation of Fake Insider Threats on Private Cloud Computing Services ”, IJSTM, vol. 3, no. 5, pp. 1484–1491, Sep. 2022.