![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Cyber Security and Mobility, Volume 7
Volume 7, Numbers 1-2, January 2018
- T. Subburaj, K. Suthendran
:
DigitalWatering Hole Attack DetectionUsing Sequential Pattern. 1-12 - S. Rajeswari, K. Suthendran
:
Chi-Square MapReduce Model for Agricultural Data. 13-24 - C. Revathy, G. Sekar:
Analytic Hierarchy Process for ResourceAllocation in Cloud Environment. 25-38 - K. Anish Pon Yamini
, Suthendran Kannan, Arivoli Thangadurai:
Handling Selfishness over Collaborative Mechanism in a MobileAd hoc Network. 39-52 - M. Maragatharajan
, S. P. Balakannan
:
A Secured MANET Using Multicast Routing Protocols and Semi Markov Process. 53-68 - A. Sebastian, Shanmugam Sivagurunathan
:
Multi DODAGs in RPL for Reliable Smart City IoT. 69-86 - Sam George, K. David:
Security Strategies for Safe Dataand Content Access in OperationalModules of Product DataManagement Software. 87-94 - M. Karuppasamy, S. P. Balakannan
:
Energy Saving from Cloud Resourcesfor a Sustainable Green Cloud ComputingEnvironment. 95-108 - Aswin Gopalakrishnan, Emanuele Vineti, Ashok Kumar Mohan
, M. Sethumadhavan:
The Art of Piecewise Hashing: A StepToward Better Evidence Provability. 109-130 - B. Thilagavathi, K. Suthendran
:
Boosting Based Implementationof Biometric Authentication in IoT. 131-144 - A. Jainul Fathima
, G. Murugaboopathi
:
A Novel Customized Big Data Analytics Framework for Drug Discovery. 145-160 - Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan
, V. Anil Kumar:
An Investigation on HTTP/2 Security. 161-189
Volume 7, Number 3, July 2018
- Gözde Karatas, Akhan Akbulut:
Survey on Access Control Mechanisms in Cloud Computing. 1-36 - Andi Fitriah Abdul Kadir
, Natalia Stakhanova, Ali A. Ghorbani:
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges. 1-52 - Ankur Chattopadhyay, Michael J. Schulz, Katie Turkiewicz, Eli Hughes:
A Novel Visual Recognition-basedAuthentication Model Using a Hybrid TrustTheme to Verify Provider Profilesfor Enhancing Information Assurancein Online Healthcare. 1-46
Volume 7, Number 4, October 2018
- Sanchit Gupta
, Harshit Sharma, Sarvjeet Kaur:
Malware Characterization Using WindowsAPI Call Sequences. 363-378 - Dac-Nhuong Le
, Bijeta Seth, Surjeet Dalal
:
A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin Cloud Environment for SecuringOutsourced Medical Database: A Revolutionary Approach. 379-408 - B. Suvarna, T. Maruthi Padmaja
:
Enhanced Matrix Chain Multiplication. 409-420
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.