Kaur, Komal Jeet. “Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture”. International Journal of Engineering and Computer Science 6, no. 7 (July 13, 2017). Accessed May 3, 2024. http://ijecs.in/index.php/ijecs/article/view/2823.