Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture.
International Journal of Engineering and Computer Science, india, v. 6, n. 7, 2017. DisponÃvel em:
http://ijecs.in/index.php/ijecs/article/view/2823. Acesso em: 14 apr. 2025.