Table of Contents
Peer-Reviewed Articles
SDN/NFV VNF Service Chaining | |
Dashmeet Anand, Harihara Kumar, Narasimha Kumar, Rohit Kulkarni, Sarang Ninale, Levi Perigo, Dewang Gedia and Rahil Gandotra | 1-7 |
Constraints Based Heuristic Approach for Task Offloading In Mobile Cloud Computing | |
Raj Kumari and Sakshi Kaushal | 8-16 |
Security Professionals Must Reinforce Detect Attacks to Avoid Unauthorized Data Exposure | |
Alain Loukaka and Shawon S. M. Rahman | 17-31 |

This work is licensed under a Creative Commons Attribution 3.0 License.