Abstract is missing.
- Security Frameworks in Mobile Cloud ComputingChaitanya Vemulapalli, Sanjay Kumar Madria, Mark Linderman. 1-41 [doi]
- An Investigation Study of Privacy Preserving in Cloud Computing EnvironmentAhmed M. Manasrah, M. A. Shannaq, M. A. Nasir. 43-61 [doi]
- Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud Computing Case StudyMouna Jouini, Latifa Ben Arfa Rabai. 63-90 [doi]
- A Novel AckIBE-Based Secure Cloud Data Management FrameworkDharavath Ramesh, Syam Kumar Pasupuleti. 91-110 [doi]
- A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud PlatformsKale Rahul Vishwanath, Bharadwaj Veeravalli, Xiaoli Wang. 111-131 [doi]
- Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their CountermeasuresAndrea Vázquez-Ingelmo, Á. M. Moreno-Montero, Francisco José García Peñalvo. 133-172 [doi]
- Security and Privacy Issues in Wireless Sensor and Body Area NetworksMoumita Roy, Chandreyee Chowdhury, Nauman Aslam. 173-200 [doi]
- Preventing Security and Privacy Attacks in WBANsAvani Vyas, Sujata Pal. 201-225 [doi]
- Underwater Wireless Sensor NetworksUsha Jain, Muzzammil Hussain. 227-245 [doi]
- Security Issues in Cognitive Radio Ad Hoc NetworksMahendra Kumar Murmu, Awadhesh Kumar Singh. 247-264 [doi]
- Security and Privacy in Social Networks: Data and Structural AnonymityR. Jain, N. Jain, A. Nayyar. 265-293 [doi]
- SOI FinFET for Computer Networks and Cyber Security SystemsNeeraj Jain, Balwinder Raj. 295-311 [doi]
- Software-Defined Networking: A Novel Approach to NetworksSumit Badotra, S. N. Panda. 313-339 [doi]
- Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future DirectionsArash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha. 341-387 [doi]
- Survey on DDoS Attack Techniques and Solutions in Software-Defined NetworkTushar Ubale, Ankit Kumar Jain. 389-419 [doi]
- Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) AttacksPrachi Gulihar, B. B. Gupta. 421-443 [doi]
- Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce NetworkBiswarup Samanta. 445-459 [doi]
- Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and SolutionsMohammed Saeed Alkatheiri, Abdur Rashid Sangi, Satish Anamalamudi. 461-473 [doi]
- Fog Computing: Applications and Secure Data AggregationSudesh Rani, Poonam Saini. 475-492 [doi]
- A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing EnvironmentBhumika Paharia, Kriti Bhushan. 493-524 [doi]
- Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things NetworkC. L. Stergiou, Andreas P. Plageras, Konstantinos E. Psannis, B. B. Gupta. 525-554 [doi]
- Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive StudyRicha, T. P. Sharma, Ajay Kumar Sharma. 555-584 [doi]
- A Systematic Review on Security and Privacy Issues in Mobile Devices and SystemsMohamed Alloghani, Thar Baker, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Ahmed J. Aljaaf. 585-608 [doi]
- Investigation of Security Issues in Distributed System MonitoringManjunath Kotari, Niranjan N. Chiplunkar. 609-634 [doi]
- An Analysis of Provable Security Frameworks for RFID SecurityAakanksha Tewari, B. B. Gupta. 635-651 [doi]
- Computational Techniques for Real-Time Credit Card Fraud DetectionSangeeta Mittal, Shivani Tyagi. 653-681 [doi]
- Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial PerspectiveBharat Bhushan, Gadadhar Sahoo. 683-713 [doi]
- Privacy Preservation of Electronic Health Record: Current Status and Future DirectionAnil Kumar, Ravinder Kumar. 715-739 [doi]
- QKD Protocols Security Between Theory and Engineering ImplementationHicham Amellal, Abdelmajid Meslouhi, Abderahim El Allati, Anass El Haddadi. 741-762 [doi]
- Survey of Security and Privacy Issues on Biometric SystemPriyanka Datta, Shanu Bhardwaj, S. N. Panda, Sarvesh Tanwar, Sumit Badotra. 763-776 [doi]
- A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint BiometricsArpita Sarkar, Binod Kumar Singh. 777-805 [doi]
- Trees, Cryptosignatures, and Cyberspace Mobile Agent InterfacesC. F. Nourani. 807-823 [doi]
- Permutation-Substitution Based Image Encryption Algorithms Using Pseudorandom Number GeneratorsKishore Bhamidipati, Soorya Annadurai. 825-848 [doi]
- Recent Trends in Text Steganography with Experimental StudyRavinder Kumar, Hitesh Singh. 849-872 [doi]
- Machine Learning Based Intrusion Detection TechniquesKishor Kumar Gulla, P. Viswanath, Suresh Babu Veluru, R. Raja Kumar. 873-888 [doi]
- Feature Selection Using a Machine Learning to Classify a MalwareMouhammd Al-Kasassbeh, Safaa Mohammed, Mohammad Alauthman, Ammar Almomani. 889-904 [doi]
- DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA DetectionR. Vinayakumar, K. P. Soman, Prabaharan Poornachandran. 905-928 [doi]
- ABFT: Analytics to Uplift Big Social Events Using Forensic ToolsPriyanka Dhaka, Bharti Nagpal. 929-948 [doi]
- HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the LaboratoryPalvi Aggarwal, Cleotilde Gonzalez, Varun Dutt. 949-959 [doi]