[1] T. Shabeera, S. Madhu Kumar, S. M. Salam, and K. Murali Krishnan, “Optimizing vm allocation and data placement for data-intensive applications in cloud using aco metaheuristic algorithm,” Eng. Sci. Technol. Int. J., vol. 20, no. 2, pp. 616–628, 2017, doi: 10.1016/j.jestch.2016.11.006.
[2] M. K. Sasubilli and V. R, “Cloud computing security challenges, threats and vulnerabilities,” in 6th International Conference on Inventive Computation Technologies (ICICT), 2021, pp. 476–480, doi: 10.1109/ICICT50816.2021.9358709.
[3] B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, “A systematic literature review on cloud computing security: Threats and mitigation strategies,” IEEE Access, vol. 9, pp. 57 792–57 807, 2021, doi: 10.1109/ACCESS.2021.3073203.
[4] R. Sharma, M. K. Gourisaria, and S. S. Patra, “Cloud computing—security, issues, and solutions,” in Communication Software and Networks, S. C. Satapathy, V. Bhateja, M. Ramakrishna Murty, N. Gia Nhu, and J. Kotti, Eds. Singapore: Springer Singapore, 2021, pp. 687–700.
[5] B. O. Sané, C. S. M. Babou, and I. Niang, “A game theoretic approach for virtual machine allocation security in cloud computing,” in Proceedings of the 2nd International Conference on Networking, Information Systems & Security, NISS 2019, Rabat, Morocco, B. Abouelmajd, M. B. Ahmed, A. A. Boudhir, and H. E. Ghazi, Eds. ACM, 2019, pp. 47:1–47:6, doi: 10.1145/3320326.3320379.
[6] K. Prabhakar, K. Dutta, R. Jain, M. Sharma, and S. K. Khatri, “Securing virtual machines on cloud through game theory approach,” in Amity International Conference on Artificial Intelligence (AICAI), 2019, pp. 859–863, doi: 10.1109/AICAI.2019.8701229.
[7] C.-S. Lee, “Multi-objective game-theory models for conflict analysis in reservoir watershed management,” Chemosphere, vol. 87, no. 6, pp. 608–613, 2012, doi: 10.1016/j.chemosphere.2012.01.014.
[8] V. Kakkad, H. Shah, R. Patel, and N. Doshi, “A comparative study of applications of game theory in cyber security and cloud computing.” Proc. Comput. Sci., vol. 155, pp. 680–685, 2019, doi: 10.1016/j.procs.2019.08.097.
[9] L. Kwiat, C. A. Kamhoua, K. A. Kwiat, and J. Tang, Risks and Benefits: Game-Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud. John Wiley & Sons, Ltd, 2018, ch. 3, pp. 49–80, doi: 10.1002/9781119428497.ch3.
[10] A.-H. Yadollahi, J. Salimi-Sartaghti, and S. Goli Bidgoli, “Modeling the security of virtual machines in the cloud using iterative game theory,” Soft Comput. J., vol. 10, no. 1, pp. 2–15, 2021, doi: 10.22052/scj.2021.242842.0 [In Persian].
[11] S. Razzaghzadeh, P. Norouzi Kivi, and B. Panahi, “A hybrid algorithm based on gossip architecture using svm for task scheduling in cloud computing,” Soft Comput. J., vol. 9, no. 2, pp. 84–93, 2021, doi: 10.22052/scj.2021.242822.0 [In Persian].
[12] E. Asadollahi and S. A. Asghari, “Prediction of appropriate number of virtual machines based on time series and artificial methods via virtual machines clustering,” Soft Comput. J., vol. 6, no. 1, pp. 66–77, 2017, [In Persian].