International Journal of Electronics and Information Engineering | ||
1. | Mobile Cloud Computing Framework for Elastic Partitioned/Modularized Applications Mobility
|
|
Salah M El-Sayed, Hatem M. Abdul Kader, Mohie M. Hadhoud, Diaa Salama AbdElminaam, Vol. 1, No. 2, 2014, pp. 53-63 Article Full Text PDF .bib |
||
2. | Common Techniques and Tools for the Analysis of Open Source Software in Order to Detect Code Clones: A Study
|
|
Hamed Jelodar, Javad Aramideh, Vol. 1, No. 2, 2014, pp. 64-69 Article Full Text PDF .bib |
||
3. | Impact of Wormhole Attack on Data Aggregation in Hieracrchical WSN
|
|
Mukesh Kumar, Kamlesh Dutta, Isha Chopra, Vol. 1, No. 2, 2014, pp. 70-77 Article Full Text PDF .bib |
||
4. | Cyber-Attacks in Cloud Computing: A Case Study
|
|
Jitendra Singh, Vol. 1, No. 2, 2014, pp. 78-87 Article Full Text PDF .bib |
||
5. | Establishing Safe Cloud: Ensuring Data Security and Performance Evaluation
|
|
Masoumeh Zareapoor, Pourya Shamsolmoali, and M. Afshar Alam, Vol. 1, No. 2, 2014, pp. 88-99 Article Full Text PDF .bib |
||
6. | Reviewer index to volume 1 (2014)
|
|