1.
Kumar GS, Devi GS, Sajid PM, Jyostna KA, Sangeetha V, Gorikapudi S, Alam T, Prabhakaran T. Threat Mitigation and Privacy Strategies for Secure Artificial Intelligence and Machine Learning Workflows in Cloud Environments. Eng. Technol. Appl. Sci. Res. [Internet]. 2025 Dec. 8 [cited 2026 May 1];15(6):28700-5. Available from: https://etasr.com/index.php/ETASR/article/view/12327