These are the sources and citations used to research thryrh. This bibliography was generated on Cite This For Me on

  • Journal

    Abdulsahib, G. and Khalaf, O.

    Comparison and Evaluation of Cloud Processing Models in Cloud-Based Networks

    2019 - International journal of simulation: systems, science & technology

    In-text: (Abdulsahib and Khalaf)

    Your Bibliography: Abdulsahib, Ghaidaa, and Osamah Khalaf. "Comparison And Evaluation Of Cloud Processing Models In Cloud-Based Networks." International journal of simulation: systems, science & technology (2019): n. pag. Web.

  • Journal

    Capps, III, C. J. and Glissmeyer, M. D.

    Extending The Competitive Profile Matrix Using Internal Factor Evaluation And External Factor Evaluation Matrix Concepts

    2015 - Journal of Applied Business Research (JABR)

    In-text: (Capps, III and Glissmeyer 1059)

    Your Bibliography: Capps, III, Charles J., and Michael D. Glissmeyer. "Extending The Competitive Profile Matrix Using Internal Factor Evaluation And External Factor Evaluation Matrix Concepts." Journal of Applied Business Research (JABR) 28.5 (2015): 1059. Web.

  • Journal

    Cassidy, C. M., Glissmeyer, M. D. and Capps III, C. J.

    Mapping An Internal-External (I-E) Matrix Using Traditional And Extended Matrix Concepts

    2013 - Journal of Applied Business Research (JABR)

    In-text: (Cassidy, Glissmeyer and Capps III 1523)

    Your Bibliography: Cassidy, Christopher M., Michael D. Glissmeyer, and Charles J. Capps III. "Mapping An Internal-External (I-E) Matrix Using Traditional And Extended Matrix Concepts." Journal of Applied Business Research (JABR) 29.5 (2013): 1523. Web.

  • Journal

    Chakraborty, S. and Dey, L.

    A rule based probabilistic technique for malware code detection

    2017 - Multiagent and Grid Systems

    In-text: (Chakraborty and Dey 271-286)

    Your Bibliography: Chakraborty, Sanjay, and Lopamudra Dey. "A Rule Based Probabilistic Technique For Malware Code Detection." Multiagent and Grid Systems 12.4 (2017): 271-286. Web.

  • Journal

    Sari, A.

    A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications

    2015 - Journal of Information Security

    In-text: (Sari 142-154)

    Your Bibliography: Sari, Arif. "A Review Of Anomaly Detection Systems In Cloud Networks And Survey Of Cloud Security Measures In Cloud Storage Applications." Journal of Information Security 06.02 (2015): 142-154. Web.

  • Journal

    Watson, J. C.

    Establishing Evidence for Internal Structure Using Exploratory Factor Analysis

    2017 - Measurement and Evaluation in Counseling and Development

    In-text: (Watson 232-238)

    Your Bibliography: Watson, Joshua C. "Establishing Evidence For Internal Structure Using Exploratory Factor Analysis." Measurement and Evaluation in Counseling and Development 50.4 (2017): 232-238. Web.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join