Knowing and investigating cloud services and attacks based on them

Document Type : Original Article

Authors

Faculty of Computer and Cyber Power, Imam Hossein Comprehensive University, Tehran, Iran