[1]
“Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis”, JT, vol. 73, no. 2, Mar. 2014, doi: 10.11113/jt.v73.4197.