Fig. 10From: Cloud repository as a malicious service: challenge, identification and implicationConstructed request headerBack to article page