(1)
Kaur, K. J. Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. int. jour. eng. com. sci 2017, 6.