Fig. 2From: Cloud repository as a malicious service: challenge, identification and implicationOverview of the cloud hosting processBack to article page