A Simply Energy-efficient Migration Algorithm of Processes with Virtual Machines in Server Clusters
A Scalable and Secure MANET for an i-Voting System
Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality
Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview
Towards Interoperabilty in Identity Federation Systems
Formalising policies for insider-threat detection: A tripwire grammar
Multi-Layer Network Architecture for Supporting Multiple Applications in Wireless Sensor Networks