Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Cyber Security and Mobility, Volume 7
Volume 7, Numbers 1-2, January 2018
- T. Subburaj, K. Suthendran:
DigitalWatering Hole Attack DetectionUsing Sequential Pattern. 1-12 - S. Rajeswari, K. Suthendran:
Chi-Square MapReduce Model for Agricultural Data. 13-24 - C. Revathy, G. Sekar:
Analytic Hierarchy Process for ResourceAllocation in Cloud Environment. 25-38 - K. Anish Pon Yamini, Suthendran Kannan, Arivoli Thangadurai:
Handling Selfishness over Collaborative Mechanism in a MobileAd hoc Network. 39-52 - M. Maragatharajan, S. P. Balakannan:
A Secured MANET Using Multicast Routing Protocols and Semi Markov Process. 53-68 - A. Sebastian, Shanmugam Sivagurunathan:
Multi DODAGs in RPL for Reliable Smart City IoT. 69-86 - Sam George, K. David:
Security Strategies for Safe Dataand Content Access in OperationalModules of Product DataManagement Software. 87-94 - M. Karuppasamy, S. P. Balakannan:
Energy Saving from Cloud Resourcesfor a Sustainable Green Cloud ComputingEnvironment. 95-108 - Aswin Gopalakrishnan, Emanuele Vineti, Ashok Kumar Mohan, M. Sethumadhavan:
The Art of Piecewise Hashing: A StepToward Better Evidence Provability. 109-130 - B. Thilagavathi, K. Suthendran:
Boosting Based Implementationof Biometric Authentication in IoT. 131-144 - A. Jainul Fathima, G. Murugaboopathi:
A Novel Customized Big Data Analytics Framework for Drug Discovery. 145-160 - Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, V. Anil Kumar:
An Investigation on HTTP/2 Security. 161-189
Volume 7, Number 3, July 2018
- Gözde Karatas, Akhan Akbulut:
Survey on Access Control Mechanisms in Cloud Computing. 1-36 - Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali A. Ghorbani:
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges. 1-52 - Ankur Chattopadhyay, Michael J. Schulz, Katie Turkiewicz, Eli Hughes:
A Novel Visual Recognition-basedAuthentication Model Using a Hybrid TrustTheme to Verify Provider Profilesfor Enhancing Information Assurancein Online Healthcare. 1-46
Volume 7, Number 4, October 2018
- Sanchit Gupta, Harshit Sharma, Sarvjeet Kaur:
Malware Characterization Using WindowsAPI Call Sequences. 363-378 - Dac-Nhuong Le, Bijeta Seth, Surjeet Dalal:
A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin Cloud Environment for SecuringOutsourced Medical Database: A Revolutionary Approach. 379-408 - B. Suvarna, T. Maruthi Padmaja:
Enhanced Matrix Chain Multiplication. 409-420
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.