Fig. 8From: Cloud repository as a malicious service: challenge, identification and implicationDistribution of attack vectors and payloads of Bars. a Distribution of attack vectors of Bars. b Distribution of payploads of BarsBack to article page