1.
Kaur KJ. Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. int. jour. eng. com. sci [Internet]. 2017 Jul. 13 [cited 2024 Jul. 22];6(7). Available from: https://ijecs.in/index.php/ijecs/article/view/2823