You are on page 1of 12

Conference Proceedings

Annual Cyber Security Conference Virtual International Conference on Product Design, Development, and
Deployment (PD3 - 2021)
11th & 12th SEPTEMBER 20212023
Full Paper Title in Title CaseCloud Security
Rajiv RanjanName Surname, Name Surname
My Institute/CompanyZivame
Address, City, CountryBangalore,India
First.Author@institution.org; Second.Author@institution.org

ABSTRACT

Cloud computing has revolutionized the way organizations store, process, and access their
data and applications. However, with the increased reliance on cloud services, security concerns
have emerged as a critical challenge. This research paper focuses on the various aspects of cloud
security, including threats, vulnerabilities, best practices, and emerging technologies.

The paper begins by exploring the unique security challenges that arise in cloud environments,
such as data breaches, insider threats, and Distributed Denial of Service (DDoS) attacks. It
analyzes the potential impact of these threats on cloud infrastructure and services, highlighting
the need for robust security measures.

Next, the paper delves into cloud security best practices. It discusses access control mechanisms,
encryption techniques, network security measures, and incident response strategies that
organizations should adopt to protect their cloud-based assets. The importance of regular security
assessments and audits is emphasized as a means to maintain a strong security posture in the
cloud.

The research paper then investigates emerging technologies and trends in cloud security. It
examines the adoption of Artificial Intelligence (AI) and machine learning for threat detection
and mitigation. Additionally, it explores the role of blockchain for enhancing data integrity and
privacy in cloud environments. The potential benefits and challenges associated with these
technologies are critically analyzed.
Furthermore, the paper addresses the compliance and legal considerations in cloud
security. It highlights the importance of adhering to data privacy regulations, industry-specific
compliance standards, and international laws when handling sensitive data in the cloud. The
potential consequences of non-compliance are discussed, emphasizing the need for organizations
to prioritize regulatory requirements.
Throughout the paper, real-world case studies and examples are presented to showcase
successful cloud security implementations. These case studies provide insights into the strategies
and practices adopted by organizations to overcome cloud security challenges and achieve robust
protection.
In conclusion, this research paper underscores the significance of cloud security in today's
digital landscape. It provides a comprehensive analysis of threats, best practices, emerging
technologies, and compliance considerations in cloud security. By understanding and
implementing the recommended security measures, organizations can mitigate risks, protect their
valuable data, and maintain the trust of their stakeholders in the cloud computing era.
In this paper, the formatting requirements for the Virtual International Conference on Product Design,
Development, and Deployment PDCUBE Conference Proceedings are described. Some recommendations on writing
for a worldwide readership are offered. Please review this document to learn about the formatting of text, table
captions, references, and the method to include the indexing information. The conference proceedings will be
published in an electronic format only. The full paper in MS Word file shall be written in compliance with these
instructions. At a later stage, it will be converted into Portable Document Format (PDF).An abstract not exceeding

PDCUBE2021-Page No 1
300 words should appear on the top of the first page, after the title of the paper in a section titled "ABSTRACT"
(without section number), after the names of the authors.
Keyword: - Publication, Product, Autodesk, Fusion 360 and PDCUBE.

[1] INTRODUCTION

Cloud computing, in today's digital era, has revolutionized the way organizations store,
process, and access their data and applications. It enables businesses to leverage the scalability,
flexibility, and cost-efficiency offered by remote computing resources. However, with the rapid
adoption of cloud services, ensuring the security and protection of sensitive data has become a
critical concern.

Significance of Cloud Security:

1)Data Protection: Cloud security plays a pivotal role in safeguarding valuable data
assets. As businesses store their data in the cloud, ensuring its confidentiality, integrity, and
availability becomes imperative. Robust security measures protect against unauthorized access,
data breaches, and data loss incidents, ensuring the privacy and trust of users.

2)Compliance and Regulatory Requirements: Many industries are subject to strict


regulatory frameworks and compliance standards that dictate the protection and privacy of
customer data. Cloud security provides mechanisms and controls to adhere to these requirements,
ensuring organizations can meet their legal obligations and avoid potential penalties or
reputational damage.
Threat Landscape: The cloud computing environment is not immune to cyber threats. It
faces a wide range of security risks, including malware, insider threats, DDoS attacks, and
unauthorized access attempts. By implementing effective cloud security measures, organizations
can mitigate these risks, detect potential breaches, and respond swiftly to security incidents.
Shared Responsibility Model: Cloud service providers follow a shared responsibility
model, where the provider is responsible for securing the underlying infrastructure, while the
customer is responsible for securing their data and applications. Understanding this model is
crucial for organizations to implement appropriate security controls and ensure a comprehensive
security posture in the cloud.
Business Continuity and Disaster Recovery: Cloud security measures include robust
backup, disaster recovery, and business continuity strategies. By leveraging cloud services,
organizations can store data in geographically distributed data centers, ensuring redundancy and
availability even in the face of natural disasters or system failures.
Trust and Reputation: Cloud security is essential for establishing trust with customers,
partners, and stakeholders. Demonstrating a commitment to protecting sensitive data and
maintaining a strong security posture can enhance an organization's reputation and competitive
advantage in the marketplace.

Overall, cloud security is of paramount importance in today's interconnected world. It


provides organizations with the confidence to embrace the cloud while protecting their
critical assets, maintaining regulatory compliance, and mitigating the evolving cyber
threats that target cloud environments.

Page No -2
It is expected that authors will submit carefully written and proofread material. Careful checking for spelling
and grammatical errors should be performed. The number of pages of the paper should be from 4 to 8.
Papers should clearly describe the background of the subject, the authors work, including the methods used,
results and concluding discussion on the importance of the work. Papers are to be prepared in English and SI units
must be used. Technical terms should be explained unless they may be considered to be known to the conference
community.

[2] CLOUD SECURITY THREATS AND VULNERABILITIESPAPER FORMAT


The uniform appearance will assist the reader to read paper of the proceedings. It is therefore suggested to
authors to use the example of this file to construct their papers. This particular example uses an American letter
format with 25 mm margins left, right, top and bottom.
All text paragraphs should be single spaced, with first line intended by 10 mm. Double spacing should only be
used before and after headings and subheadings as shown in this example. Position and style of headings and
subheadings should follow this example. No spaces should be placed between paragraphs.

[2.1] VARIOUS SECURITY THREATS AND VULNERABILITIES CORRESPONDING TO CLOUD


COMPUTINGHeader, Footer, Page Numbering

1. Data Breaches: Data breaches pose a significant threat in cloud computing


environments. They occur when unauthorized individuals gain access to sensitive
data stored in the cloud. Breaches can lead to data theft, identity theft, financial
loss, and reputational damage for organizations. Weak access controls, improper
authentication mechanisms, and inadequate encryption can contribute to data
breach vulnerabilities.
2. Insider Threats: Insider threats involve malicious or negligent activities by
individuals within an organization who have authorized access to the cloud
resources. These individuals may intentionally misuse or steal data, compromise
system configurations, or exploit vulnerabilities for personal gain or sabotage.
Insider threats can be challenging to detect and mitigate, requiring robust
monitoring, access controls, and employee awareness programs.
3. Denial-of-Service (DoS) Attacks: DoS attacks aim to disrupt or suspend the
availability of cloud services by overwhelming the resources or infrastructure.
Attackers flood the cloud systems with excessive requests or traffic, causing
legitimate users to be unable to access the services. DoS attacks can impact
business operations, cause financial losses, and harm an organization's
reputation. Implementing measures such as traffic monitoring, load balancing,
and intrusion detection systems can help mitigate the risk of DoS attacks.
4. Insecure Application Programming Interfaces (APIs): APIs provide a means for
applications to interact with cloud services. Insecurely designed or implemented
APIs can become a vulnerability, allowing attackers to bypass security controls
and gain unauthorized access to sensitive data or cloud resources. Regular
security assessments of APIs, strong authentication mechanisms, and encryption
of data transmitted through APIs are crucial to mitigate this risk.
5. Inadequate Authentication and Access Controls: Weak or misconfigured
authentication mechanisms and access controls can expose cloud resources to
unauthorized access. Attackers can exploit these vulnerabilities to gain privileges,

Page No -3
manipulate or steal data, or launch further attacks within the cloud environment.
Implementing strong authentication methods, multi-factor authentication, and
least privilege access principles are essential to mitigate this risk.
6. Data Loss and Data Leakage: Cloud services rely on data storage and
transmission, making data loss and leakage a significant concern. Data can be
lost due to hardware failures, software bugs, or human errors. Data leakage
occurs when sensitive or confidential information is inadvertently or maliciously
disclosed to unauthorized individuals. Robust backup and disaster recovery
mechanisms, encryption of data at rest and in transit, and data loss prevention
(DLP) strategies help minimize these risks.
7. Malware and Advanced Persistent Threats (APTs): Cloud environments are not
immune to malware infections and APTs. Malware can infect virtual machines,
compromise applications, and steal sensitive data. APTs involve sophisticated,
targeted attacks that persistently exploit vulnerabilities over an extended period.
Employing up-to-date antivirus software, regular security patching, and intrusion
detection and prevention systems are critical to mitigating these threats.
Authors are asked to replace the "XXX" number (with the paper code that was assigned when the paper was
accepted) on the header of the first page and on the footer of other pages in order to set a unique page number in the
Proceedings.

[2.2] OVERVIEW OF COMMON ATTACKS IN THE CONTEXT OF DATA BREACHES, INSIDER THREATS AND
DDOSFonts

Here's an overview of common attacks in the context of data breaches, insider threats,
and Distributed Denial of Service (DDoS) attacks:

1. Data Breaches:
 SQL Injection: Attackers exploit vulnerabilities in web applications by
injecting malicious SQL statements, allowing them to manipulate
databases and access sensitive data.
 Phishing: Attackers trick individuals into revealing their confidential
information, such as login credentials or financial details, through
deceptive emails or websites.
 Malware Attacks: Malicious software, such as ransomware or keyloggers, is
used to gain unauthorized access to systems, steal data, or encrypt files
until a ransom is paid.
 Password Attacks: Techniques like brute-force attacks or dictionary attacks
are employed to guess weak passwords and gain unauthorized access to
systems or accounts.
 Insider Threats: Insiders with authorized access to systems intentionally or
unintentionally misuse their privileges to access, steal, or leak sensitive
data.
2. Insider Threats:

Page No -4
Data Theft: Insiders with malicious intent may exfiltrate sensitive data, such

as customer information or intellectual property, for personal gain or to
sell to competitors.
 Unauthorized Access: Insiders abuse their privileges to access data or
systems beyond their authorized scope, potentially leading to data
compromise or system disruption.
 Sabotage: Insiders may intentionally manipulate configurations, delete
critical data, or disrupt services to cause harm or damage to the
organization.
3. Distributed Denial of Service (DDoS) Attacks:
 Network Layer Attacks: Attackers flood the targeted network infrastructure
with a massive volume of traffic, overwhelming the network and rendering
it unavailable to legitimate users.
 Application Layer Attacks: Attackers target specific applications or services,
exhausting their resources and causing service disruption or degradation.
 Amplification Attacks: Attackers exploit vulnerable network protocols or
services to generate a high volume of traffic, amplifying the impact of the
attack.
 Botnet Attacks: Attackers leverage a network of compromised devices
(botnet) to launch coordinated DDoS attacks, making it difficult to trace
the source and intensifying the attack.

These are just a few examples of common attacks related to data breaches, insider
threats, and DDoS attacks. It's important to note that attackers continually evolve their
tactics, and new attack methods emerge over time. Organizations need to stay vigilant,
implement robust security measures, and regularly update their defenses to protect
against these threats.
Papers should use 09-point Arial font. The styles available are bold, italic and underlined. It is recommended
that text in figures should not smaller than 08-point Arial font size.

[2.3] Tables and Figures


Figure captions and table headings should be sufficient to explain the figure or table without needing to refer
to the text. Figures and tables not cited in the text should not be presented. The following is an example for Table 1.

Table 1 Title of the Table


Type of micro-particles Average size (micro meter) Variance (micro meter)
CuO 47 4.2
NiO 35 6.4
Tables and figures should be placed close after their first reference in the text. All figures and tables should be
numbered with Arabic numerals. Table headings should be centred above the tables. Figure captions should be
centred below the figures as shown in Figure 1.

Page No -5
Figure 1: Conference tentative poster

[2.4] Equations
Each equation should be presented on a separate line from the text with a blank space above and below.
Equations should be clear and expressions used should be explained in the text. The equations should be numbered
consecutively at the outer right margin, as shown in Eqs. (1) - (2) below. Here is one example.
In this case, the governing system of equations can be written as follows:

(1)

(2)
[2.5] References
Proper references must be included throughout the text and the list of references must be provided in this
section. The references inserted in the text and the list of references must be done as follow:
Reference citations: Citations in the main body, appendices, tables and figures are to be made using the last
name of the author (both authors when only two; first author plus et al. when more than two). Example: "... as
previously shown (Jones et al., 1989)," or "... as shown by Jones et al. (1989)." For two or more papers published in
the same year by the same author(s), add a, b, c, etc. to the year such as (1980a) or (1980b) and cite jointly as Jones
et al. (1980a, b).
List of references: List all cited references (including citations in tables, figures and appendices) in
alphabetical order according to the first-named author. The titles of papers, patents and books or monograph
chapters and the initial and final page numbers are to be included. Abbreviations of journal names should conform to
the usage of Chemical Abstracts. Example for journal papers, book/monograph sections or chapters, and conference
proceedings are given the reference section at the end of this document.

[3] SUBMITTING THE PAPERCLOUD SECURITY BEST PRACTICES

Here's an overview of cloud security best practices:

1. Strong Authentication and Access Controls:


 Implement strong authentication mechanisms, such as multi-factor
authentication (MFA), to ensure that only authorized users can access
cloud resources.
 Enforce least privilege principles by granting users the minimum level of
access required for their roles.

Page No -6
 Regularly review and update access control policies to reflect changes in
personnel or system requirements.
2. Robust Data Encryption:
 Encrypt sensitive data at rest and in transit to protect it from unauthorized
access. Utilize strong encryption algorithms and protect encryption keys
appropriately.
 Implement encryption for data stored within the cloud service provider's
infrastructure to ensure confidentiality and data privacy.
3. Comprehensive Security Monitoring:
 Employ robust monitoring and logging mechanisms to detect and
respond to security incidents promptly. Monitor access logs, network
traffic, and system logs for suspicious activities or anomalies.
 Implement intrusion detection and prevention systems (IDPS) to detect
and block potential attacks or malicious activities.
4. Regular Security Assessments and Audits:
 Conduct regular security assessments, vulnerability scanning, and
penetration testing to identify and address potential vulnerabilities in
cloud infrastructure and applications.
 Perform periodic security audits to ensure compliance with industry
standards, regulations, and internal security policies.
5. Data Backup and Disaster Recovery:
 Establish a robust backup and disaster recovery strategy to ensure data
availability and business continuity in the event of system failures, natural
disasters, or cyber-attacks.
 Regularly test backup and recovery procedures to verify their effectiveness
and reliability.
6. Vendor Due Diligence:
 Conduct thorough assessments of cloud service providers' security
capabilities and practices before engaging their services. Evaluate their
certifications, data protection measures, incident response procedures, and
security track record.
 Review and understand the terms of service agreements and service level
agreements (SLAs) to ensure they align with security requirements and
responsibilities.
7. Employee Education and Awareness:
 Provide comprehensive security training and awareness programs for
employees to educate them about cloud security best practices, potential
threats, and their roles in maintaining security.
 Foster a culture of security awareness and encourage employees to report
any suspicious activities or potential security incidents promptly.

Page No -7
It's important to note that these are general cloud security best practices, and
organizations should tailor them to their specific requirements and cloud environment.
Additionally, staying updated with the latest security trends, patches, and security
advisories is crucial for maintaining a strong security posture in the cloud.
The full paper has to be submitted electronically via the website of the conference
(https://easychair.org/conferences/?conf=pdcube2021).Paper number (in the format "XXX") is assigned to each
abstract after it was accepted and authors are kindly asked to place the paper number to the correct positions in the
header and footer before submitting the final version. The final paper file name should be the same name as for the
accepted abstract (e.g. “XXX.doc”).

[4] CONFERENCE PROGRAM AND PROCEEDINGSEMERGING TECHNOLOGIES AND TRENDS IN CLOUD


SECURITY

1. Artificial Intelligence (AI) and Machine Learning:


 AI and machine learning techniques are being utilized to enhance threat
detection and response capabilities in cloud security.
 AI-based algorithms can analyze large volumes of security logs and data
to identify patterns, anomalies, and potential security threats in real-time.
 Machine learning models can learn from past security incidents to improve
the accuracy and efficiency of security monitoring and incident response.
2. Zero Trust Architecture:
 Zero Trust Architecture (ZTA) is gaining traction as a security framework
for cloud environments.
 ZTA assumes that no user or device can be trusted by default, and
authentication and authorization are required for every access request.
 ZTA focuses on implementing strict access controls, continuous
monitoring, and micro-segmentation to protect cloud resources from
unauthorized access.
3. Cloud-native Security:
 As cloud-native architectures, such as containers and serverless
computing, gain popularity, cloud-native security practices are evolving.
 Cloud-native security involves implementing security controls and
practices specific to cloud-native environments, such as container security,
Kubernetes security, and serverless function security.
 Specialized security tools and platforms are being developed to address
the unique security challenges introduced by cloud-native architectures.
4. Blockchain for Data Integrity and Privacy:
 Blockchain technology is being explored to enhance data integrity and
privacy in cloud environments.
 By leveraging blockchain's decentralized and immutable nature,
organizations can ensure the integrity of data stored in the cloud and
establish a trusted audit trail.

Page No -8
Blockchain can also enable secure sharing of data across multiple cloud
platforms while maintaining data privacy and ownership.
5. Cloud Security Posture Management (CSPM):
 CSPM tools are emerging to provide continuous monitoring and
management of an organization's cloud security posture.
 CSPM solutions help identify misconfigurations, compliance violations, and
security gaps in cloud environments, enabling organizations to proactively
address security risks.
 These tools offer automated remediation and policy enforcement
capabilities to improve cloud security hygiene.
6. DevSecOps:
 DevSecOps, the integration of security practices into the DevOps workflow,
is gaining prominence in cloud security.
 It emphasizes incorporating security controls, vulnerability scanning, and
automated security testing throughout the software development and
deployment lifecycle.
 DevSecOps promotes collaboration between development, operations,
and security teams to ensure secure and reliable cloud deployments.

These are just a few examples of emerging technologies and trends in cloud security. As
the cloud landscape continues to evolve, new technologies and innovative approaches
will play a crucial role in addressing the ever-changing security challenges in cloud
computing.
The abstracts are compiled into the conference Proceedings and uploaded in the website page.

[5] COMPLIANCE AND LEGAL CONSIDERATIONS IN CLOUD SECURITYNCLUSION

1. Data Protection Regulations:


 Organizations must comply with data protection regulations such as the
General Data Protection Regulation (GDPR) in the European Union, the
California Consumer Privacy Act (CCPA), and other regional or industry-
specific data protection laws.
 Compliance may involve ensuring proper data handling practices,
obtaining consent for data processing, implementing data breach
notification procedures, and ensuring data transfer compliance when
utilizing cloud services across borders.
2. Data Ownership and Control:
 Organizations need to understand the terms and conditions of cloud
service provider agreements regarding data ownership and control.

Page No -9
 It's important to ensure that the organization retains appropriate
ownership and control over its data stored in the cloud, including the
ability to access, transfer, and delete data as required.
3. Security Audits and Certifications:
 Compliance may involve undergoing security audits and obtaining
relevant certifications to demonstrate adherence to industry best practices
and security standards.
 Examples of certifications include ISO 27001 (Information Security
Management System), SOC 2 (Service Organization Control), and PCI DSS
(Payment Card Industry Data Security Standard).
4. Data Residency and Sovereignty:
 Organizations must consider legal requirements related to data residency
and sovereignty, which specify where data can be stored and processed.
 Certain industries or countries have regulations that restrict the storage or
transfer of data across borders, requiring organizations to ensure
compliance with such requirements when utilizing cloud services.
5. Contractual Agreements:
 Careful review and negotiation of contractual agreements with cloud
service providers are necessary to address security and compliance
concerns.
 Organizations should assess whether the cloud provider meets their
specific compliance requirements and ensure that contractual terms
include provisions for data protection, security, breach notification, and
liability.
6. Incident Response and Reporting:
 Organizations should establish incident response plans and procedures to
address security incidents promptly and effectively.
 Compliance obligations may include reporting security incidents to
regulatory authorities, affected individuals, or other relevant stakeholders
within specified timeframes.
7. Vendor Management and Due Diligence:
 Organizations must conduct due diligence when selecting cloud service
providers and assess their security controls, certifications, and compliance
with relevant laws and regulations.
 It's important to review vendor contracts and service-level agreements to
ensure that the cloud service provider meets compliance requirements and
has appropriate security measures in place.
8. Employee Training and Awareness:

Page No -10
Organizations should provide regular training and awareness programs to

employees regarding compliance requirements, data protection, and cloud
security best practices.
 Employees should be educated about their roles and responsibilities in
maintaining compliance and ensuring the security of cloud-based systems
and data.
These are some key compliance and legal considerations in cloud security. Organizations
should consult legal experts and stay updated with evolving regulations to ensure ongoing
compliance with applicable laws and industry-specific requirements.

F) CONCLUSION
Conclusions should state concisely the most important propositions of the paper as well as the author’s views
of the practical implications of the results.
ACKNOWLEDGEMENTS

In conclusion, cloud computing offers numerous benefits in terms of scalability, flexibility, and cost-efficiency.
However, the widespread adoption of cloud services also brings forth significant security challenges that must be
addressed to ensure the protection of sensitive data and maintain the trust of users and organizations. Throughout
this paper, we have explored various aspects of cloud security, including threats and vulnerabilities, common attack
vectors, and best practices for mitigating risks.
Threats such as data breaches, insider threats, and DDoS attacks pose significant risks to cloud infrastructure
and services. Understanding these threats and their potential impacts is crucial for organizations to develop effective
security strategies. By implementing strong authentication mechanisms, robust data encryption, comprehensive
security monitoring, and regular security assessments, organizations can bolster their defenses and reduce the
likelihood of successful attacks.
Compliance and legal considerations play a vital role in cloud security, as organizations must adhere to data
protection regulations, ensure data ownership and control, and fulfill contractual obligations. Failure to comply with
these requirements can result in legal liabilities, reputational damage, and financial losses. Therefore, organizations
must prioritize compliance efforts and conduct due diligence when selecting cloud service providers.
The emergence of new technologies and trends, such as AI and machine learning, zero trust architecture, and
cloud-native security, presents opportunities to enhance cloud security measures. These advancements offer
innovative approaches to threat detection, access controls, and security monitoring, enabling organizations to stay
one step ahead of evolving threats.
Real-world examples and case studies have demonstrated the importance of proactive security measures,
proper configuration management, employee training, and continuous monitoring. By learning from these incidents,
organizations can implement effective security controls, conduct regular security audits, and establish incident
response plans to minimize the impact of security breaches.
In conclusion, cloud security is a multifaceted and ever-evolving field that demands constant attention and
proactive measures. Organizations must recognize the unique security challenges posed by cloud computing and
take steps to mitigate risks and protect their cloud infrastructure and data. By implementing a holistic approach to
cloud security, organizations can harness the benefits of cloud computing while ensuring the confidentiality, integrity,
and availability of their systems and data.
As cloud technology continues to advance, it is imperative for researchers, industry practitioners, and
policymakers to collaborate and share knowledge to stay ahead of emerging threats and develop robust security
frameworks. Only through collective efforts can we build a secure and resilient cloud ecosystem that enables
organizations to leverage the full potential of cloud computing with confidence and trust.

A short acknowledgement section can be written between the conclusion and the references. Sponsorship and
financial support acknowledgments should be included here. Acknowledging the contributions of other colleagues
who are not included in the authorship of this paper is also added in this section. If no acknowledgement is
necessary, this section should not appear in the paper.
REFERENCES
References should be numbered using Arabic numerals followed by a period (.) as shown below and should follow
the format in the below examples.
P. P. Crown and L. Justin, The News Physics (Publisher Name, Publisher City, 2007), pp. 15–20.
C. P. Grown and D. Arstin, Appl. Chem. Letters 84, 2501–2502 (2009).

Page No -11
R. S. Lang, “Title of Chapter,” in Classic Physiques, edited by R. C. Tamil (Publisher Name, Publisher City, 1990), pp.
211–214.
P. D. Dmith and E. C. Cones, “Load-cycling in cubic press,” in Shock Compression of Condensed Matter-2001, VIP
Conference Proceedings 420, edited by M. F. Durnish et al. (VIP Publishing, Celville, NY, 2001), pp. 652–653.
B. C. Backson and T. Ditman, U.S. Patent No. 3,345,224 (9 July 2005)
D. D. Lavids, “Recovery effects in binary titanium alloys,” Ph.D. thesis, Hirvard University, 1998.
R. R. Vikkylson (private communication).

Page No -12

You might also like