1.
Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. int. jour. eng. com. sci [Internet]. 2017 Jul. 13 [cited 2025 Dec. 5];6(7). Available from: http://www.ijecs.in/index.php/ijecs/article/view/2823