[1]
2017. Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. International Journal of Engineering and Computer Science. 6, 7 (Jul. 2017).