1 | -- | 10 | Chaima Bensaid, Sofiane BOUKLI HACENE, Kamel Mohamed Faraoun. Detection and Ignoring of Blackhole Attack in Vanets Networks |
11 | -- | 24 | Yassine Rhazali, Youssef Hadi, Abdelaziz Mouloudi. A Based-Rule Method to Transform CIM to PIM into MDA |
25 | -- | 36 | Mohammed Rasol, Bassam Al Kasasbeh, Farah Al Adwan. An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats |
37 | -- | 48 | Beatriz Adriana Gomez, Kailash Evans. A Practical Application of TrimCloud: Using TrimCloud as an Educational Technology in Developing Countries |
49 | -- | 54 | Omar Sabri. Applying the Updated Delone and Mclean is Success Model for Enterprise Cloud Computing Readiness |
55 | -- | 63 | Goknur Arzu Akyuz, Mohammad Rehan. A Generic, Multi-Period and Multi-Partner Cost Optimizing Model for Cloud-Based Supply Chain |
64 | -- | 79 | Mohit Mathur, Mamta Madan, Kavita Chaudhary. A Satiated Method for Cloud Traffic Classification in Software Defined Network Environment |