[1]
“Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture”,
int. jour. eng. com. sci
, vol. 6, no. 7, Jul. 2017, Accessed: Apr. 12, 2025. [Online]. Available:
http://ijecs.in/index.php/ijecs/article/view/2823