901 | -- | 0 | Rebecca Capone. Publisher's note |
902 | -- | 0 | Jinjun Chen, Jianxun Liu. Special Issue: Dependable and Secure Computing |
903 | -- | 915 | Yongming Xie, Guojun Wang. Message matching-based greedy behavior detection in delay tolerant networks |
916 | -- | 934 | Aarthi Nagarajan, Vijay Varadharajan, Nathan Tarr. Trust enhanced distributed authorisation for web services |
935 | -- | 952 | Christopher Bailey, David W. Chadwick, Rogério de Lemos. Self-adaptive federated authorization infrastructures |
953 | -- | 972 | Atef Shalan, Mohammad Zulkernine. Software control flow error detection and correlation with system performance deviation |
973 | -- | 993 | Julian Jang-Jaccard, Surya Nepal. A survey of emerging threats in cybersecurity |
994 | -- | 1007 | Jiaqi Zhao, Lizhe Wang, Jie Tao, Jinjun Chen, Weiye Sun, Rajiv Ranjan, Joanna Kolodziej, Achim Streit, Dimitrios Georgakopoulos. A security framework in G-Hadoop for big data computing across distributed Cloud data centres |
1008 | -- | 1020 | Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen. A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud |
1021 | -- | 1036 | Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Bailin Xie. Internet traffic clustering with side information |