[1]
K. J. Kaur, “Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture”, int. jour. eng. com. sci, vol. 6, no. 7, Jul. 2017.