Security of text data outsourcing in cloud computing Authors :Shristi Bhute and Siddhartha Kumar Arjaria DOI : http://dx.doi.org/ 10.19101/IJATEE.2016.319004
An approach for efficient intrusion detection based on R-ACO Authors :Namita Sharma and Bhupesh Gaur DOI : http://dx.doi.org/ 10.19101/IJATEE.2016.320005