[1]
L. S. Datla, “Identity Threat Detection: Techniques for Preventing Credential Abuse in Cloud Systems”, IJETCSIT, vol. 2, no. 4, pp. 95–104, Dec. 2021, doi: 10.63282/3050-9246.IJETCSIT-V2I4P111.