5 | -- | 19 | Ahmad M. Manasrah. Dynamic weighted VM load balancing for cloud-analyst |
20 | -- | 35 | Aditi Zear, Amit Kumar Singh, Pardeep Kumar. Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications |
36 | -- | 48 | Lo'ai Ali Tawalbeh, Fadi Ababneh, Yaser Jararweh, Fahd M. Al-Dosari. Trust delegation-based secure mobile cloud computing framework |
49 | -- | 84 | Arif Khan. Virtual machine security |
85 | -- | 99 | Omar M. Al-Jarrah, Moath Al-Ayoub, Yaser Jararweh. Hierarchical detection of insider attacks in cloud computing systems |
100 | -- | 113 | Hisham M. Alsaghier. A secure mobile commerce framework based on community cloud |
114 | -- | 129 | Jothi Rangasamy, Lakshmi Kuppusamy, Gopi Krishnan, Velmurugan. Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services |
130 | -- | 155 | Amit Kr. Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya. Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way |