[1]
Kaur, K.J. 2017. Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. International Journal of Engineering and Computer Science. 6, 7 (Jul. 2017).