Published: 2021-08-10

A Secure Source Routing Protocol for Mobile Ad Hoc Networks

Baban A. Mahmood A. Mahmood, D. Manivannan

212-234

DOI: https://doi.org/10.47164/ijngc.v11i3.180
DOI: https://doi.org/10.47164/ijngc.v11i3.181

Fuzzy Logic Based Detection of SLA Violation in Cloud Computing - A Predictive Approach

Prabhat Kumar Upadhyay, Archana Pandita, Nisheeth Joshi

250-262

DOI: https://doi.org/10.47164/ijngc.v11i3.182
DOI: https://doi.org/10.47164/ijngc.v11i3.183
DOI: https://doi.org/10.47164/ijngc.v11i3.184