Abstract is missing.
- Adaptive and Flexible Virtual HoneynetWenjun Fan, David Fernández Cambronero, Zhihui Du. 1-17 [doi]
- Analysis of Location Spoofing Identification in Cellular NetworksYuxin Wei, Dawei Liu. 18-27 [doi]
- Leveraging Event Structure for Adaptive Machine Learning on Big Data LandscapesAmir Azodi, Marian Gawron, Andrey Sapegin, Feng Cheng 0002, Christoph Meinel. 28-40 [doi]
- Graph- and Cloud-Based Tools for Computer Science EducationVictor N. Kasyanov, Elena V. Kasyanova. 41-54 [doi]
- ERP Costumer Assistance Using Ubiquitous AgentsNardjes Bouchemal, Ramdane Maamri, Zaïdi Sahnoun. 55-62 [doi]
- A Hybrid Algorithm for DAG Application Scheduling on Computational GridsLyes Bouali, Karima Oukfif, Samia Bouzefrane, Fatima Oulebsir-Boumghar. 63-77 [doi]
- Toward Scheduling I/O Request of Mapreduce Tasks Based on Markov ModelSonia Ikken, Éric Renault, M. Tahar Kechadi, Abdelkamel Tari. 78-89 [doi]
- Improving the Reliability and the Performance of CAPE by Using MPI for Data Exchange on NetworkVan Long Tran, Éric Renault, Viet Hai Ha. 90-100 [doi]
- Wi-Fi Channels Saturation Using Standard Wi-Fi GatewayDaniel Cortes Cañas, Brayan S. Reyes Daza, Octavio J. Salcedo Parra. 101-108 [doi]
- Cloud Access Secure with Identity Based CryptographyHouria Hamadi, Abdelkrim Khireddine, Abdelkamel Tari. 109-118 [doi]
- SDN-Based QoS Aware Network Service ProvisioningCosmin Caba, José Soler. 119-133 [doi]
- Poisson-Based Anomaly Detection for Identifying Malicious User BehaviourAndrey Sapegin, Aragats Amirkhanyan, Marian Gawron, Feng Cheng 0002, Christoph Meinel. 134-150 [doi]
- Analysis of Privacy and Security Exposure in Mobile Dating ApplicationsConstantinos Patsakis, Athanasios Zigomitros, Agusti Solanas. 151-162 [doi]
- CBUPRE to Secure MANETs from DoS AttacksRadha Krishna Reddy Pallavali, Samia Bouzefrane, Selma Boumerdassi. 163-175 [doi]