(1)
, P. C. J. S. D. P. P. K. D. V. M. T. Detecting Malicious Applications from the Cloud by Using User Feedback Method. IJRITCC 2016, 4, 212-215.