“Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture”.
International Journal of Engineering and Computer Science
, vol. 6, no. 7, July 2017,
http://ijecs.in/index.php/ijecs/article/view/2823
.