View / Download | : | 16741 |
S.No. | Title | Author | Pages | View | Google Scholar |
1 |
Security of text data outsourcing in cloud computing |
Shristi Bhute and Siddhartha Kumar Arjaria | 91-97 | 8543 | View |
2 |
An approach for efficient intrusion detection based on R-ACO |
Namita Sharma and Bhupesh Gaur | 98-104 | 8198 | View |