“Methods for detection and analysis of misconfiguration-based attacks in cloud services” (2025) Information systems and technologies security, 1(9), pp. 26–31. doi:10.17721/ISTS.2025.9.26-31.