(1)
Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. int. jour. eng. com. sci 2017, 6 (7).