“Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture”.
International Journal of Engineering and Computer Science
6, no. 7 (July 13, 2017). Accessed April 12, 2025.
http://ijecs.in/index.php/ijecs/article/view/2823
.