Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. (2017). International Journal of Engineering and Computer Science, 6(7). http://ijecs.in/index.php/ijecs/article/view/2823