[1]
Kumar, G.S., Devi, G.S., Sajid, P.M., Jyostna, K.A., Sangeetha, V., Gorikapudi, S., Alam, T. and Prabhakaran, T. 2025. Threat Mitigation and Privacy Strategies for Secure Artificial Intelligence and Machine Learning Workflows in Cloud Environments. Engineering, Technology & Applied Science Research. 15, 6 (Dec. 2025), 28700–28705. DOI:https://doi.org/10.48084/etasr.12327.