“Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture”. 2017.
International Journal of Engineering and Computer Science
6 (7).
http://ijecs.in/index.php/ijecs/article/view/2823
.