Journal: J. Comput. Syst. Sci.

Volume 80, Issue 5

901 -- 0Rebecca Capone. Publisher's note
902 -- 0Jinjun Chen, Jianxun Liu. Special Issue: Dependable and Secure Computing
903 -- 915Yongming Xie, Guojun Wang. Message matching-based greedy behavior detection in delay tolerant networks
916 -- 934Aarthi Nagarajan, Vijay Varadharajan, Nathan Tarr. Trust enhanced distributed authorisation for web services
935 -- 952Christopher Bailey, David W. Chadwick, Rogério de Lemos. Self-adaptive federated authorization infrastructures
953 -- 972Atef Shalan, Mohammad Zulkernine. Software control flow error detection and correlation with system performance deviation
973 -- 993Julian Jang-Jaccard, Surya Nepal. A survey of emerging threats in cybersecurity
994 -- 1007Jiaqi Zhao, Lizhe Wang, Jie Tao, Jinjun Chen, Weiye Sun, Rajiv Ranjan, Joanna Kolodziej, Achim Streit, Dimitrios Georgakopoulos. A security framework in G-Hadoop for big data computing across distributed Cloud data centres
1008 -- 1020Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen. A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud
1021 -- 1036Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Bailin Xie. Internet traffic clustering with side information