“Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture”. International Journal of Engineering and Computer Science 6, no. 7 (July 13, 2017). Accessed April 12, 2025. http://ijecs.in/index.php/ijecs/article/view/2823.