1.
Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. int. jour. eng. com. sci [Internet]. 2017 Jul. 13 [cited 2025 Dec. 5];6(7). Available from: https://ijecs.in/index.php/ijecs/article/view/2823