[1]
P. C. J. S. D. P. P. K. D. V. M. T., “Detecting Malicious Applications from the cloud by using user feedback method”, IJRITCC, vol. 4, no. 5, pp. 212–215, May 2016.