1.
Kaur KJ. Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. int. jour. eng. com. sci [Internet]. 2017 Jul. 13 [cited 2024 May 4];6(7). Available from: http://ijecs.in/index.php/ijecs/article/view/2823