S.No. | Title | Author | Pages | View | Google Scholar |
---|---|---|---|---|---|
1 |
Security of text data outsourcing in cloud computing DOI:10.19101/IJATEE.2016.319004 |
Shristi Bhute and Siddhartha Kumar Arjaria |
91 -97 |
9349 |
View |
2 |
An approach for efficient intrusion detection based on R-ACO DOI:10.19101/IJATEE.2016.320005 |
Namita Sharma and Bhupesh Gaur |
98 -104 |
8954 |
View |