“Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture” (2017)
International Journal of Engineering and Computer Science
, 6(7). Available at:
http://ijecs.in/index.php/ijecs/article/view/2823
(Accessed: 13 April 2025).