Article Security of text data outsourcing in cloud computing Authors :Shristi Bhute and Siddhartha Kumar Arjaria DOI : http://dx.doi.org/ 10.19101/IJATEE.2016.319004 View Full Article
Article An approach for efficient intrusion detection based on R-ACO Authors :Namita Sharma and Bhupesh Gaur DOI : http://dx.doi.org/ 10.19101/IJATEE.2016.320005 View Full Article