(1)
Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture.
int. jour. eng. com. sci
2017
,
6
(7).