Fig. 2
From: Cloud repository as a malicious service: challenge, identification and implication

Overview of the cloud hosting process
From: Cloud repository as a malicious service: challenge, identification and implication
Overview of the cloud hosting process