[1]
2017. Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture.
International Journal of Engineering and Computer Science
. 6, 7 (Jul. 2017).