{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T01:24:15Z","timestamp":1744161855932},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T00:00:00Z","timestamp":1516320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11277-018-5284-6","type":"journal-article","created":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T05:59:52Z","timestamp":1516341592000},"page":"1161-1177","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Secure Disintegration Protocol for Privacy Preserving Cloud Storage"],"prefix":"10.1007","volume":"103","author":[{"given":"Bharat S.","family":"Rawal","sequence":"first","affiliation":[]},{"given":"V.","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"given":"Gunasekaran","family":"Manogaran","sequence":"additional","affiliation":[]},{"given":"R.","family":"Varatharajan","sequence":"additional","affiliation":[]},{"given":"Naveen","family":"Chilamkurti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,19]]},"reference":[{"issue":"2","key":"5284_CR1","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSC.2011.24","volume":"5","author":"C Wang","year":"2012","unstructured":"Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5(2), 220\u2013232.","journal-title":"IEEE Transactions on Services Computing"},{"key":"5284_CR2","unstructured":"Sun Microsystems Inc. (2009). Building customer trust in cloud computing with transparent security. https:\/\/www.sun.com\/offers\/details\/suntransparency.xml ."},{"key":"5284_CR3","doi-asserted-by":"crossref","unstructured":"Rawal, B. S., Kalutarage, H. K., Sree Vivek, S., & Pandey, K. (2016). The disintegration protocol: An ultimate technique for cloud data security. In 2016 IEEE international conference on smart cloud (in press).","DOI":"10.1109\/SmartCloud.2016.9"},{"key":"5284_CR4","doi-asserted-by":"crossref","unstructured":"Madan, B. B., Banik, M., & Wu, B. C. (2016). Intrusion tolerant multi-cloud distributed storage. In 2016 IEEE international conference on smart cloud (in press).","DOI":"10.1109\/SmartCloud.2016.30"},{"key":"5284_CR5","doi-asserted-by":"crossref","unstructured":"Santos, C. A. R., & Matias, R. (2017) An empirical study on patterns of failure causes in a mass-market operating system. In Proceedings of the symposium on applied computing (pp. 1542\u20131547). ACM.","DOI":"10.1145\/3019612.3019740"},{"key":"5284_CR6","volume-title":"The Human element of big data: issues, analytics, and performance","author":"D Lopez","year":"2016","unstructured":"Lopez, D., & Manogaran, G. (2016). Big data architecture for climate change and disease dynamics. In G. S. Tomar et al. (Eds.), The Human element of big data: issues, analytics, and performance. Boca Raton: CRC Press."},{"issue":"2","key":"5284_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJACI.2017040106","volume":"8","author":"G Manogaran","year":"2017","unstructured":"Manogaran, G., & Lopez, D. (2017). Disease Surveillance System for Big Climate Data Processing and Dengue Transmission\u201d. International Journal of Ambient Computing and Intelligence, 8(2), 1\u201325.","journal-title":"International Journal of Ambient Computing and Intelligence"},{"key":"5284_CR8","unstructured":"Manogaran, G., & Lopez, D. (2017). Spatial cumulative sum algorithm with big data analytics for climate change detection. Computers & Electrical Engineering."},{"key":"5284_CR9","first-page":"1","volume":"21","author":"G Manogaran","year":"2017","unstructured":"Manogaran, G., & Lopez, D. (2017). A Gaussian process based big data processing framework in cluster computing environment. Cluster Computing, 21, 1\u201316.","journal-title":"Cluster Computing"},{"key":"5284_CR10","unstructured":"Jansen. W., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing\u2014NIST Special Publication 800-144. NIST ( http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-144.pdf )."},{"issue":"8","key":"5284_CR11","first-page":"1","volume":"28","author":"D Lopez","year":"2017","unstructured":"Lopez, D., Manogaran, G., & Jagan, J. (2017). Modelling the H1N1 influenza using mathematical and neural network approaches. Biomedical Research, 28(8), 1\u20135.","journal-title":"Biomedical Research"},{"key":"5284_CR12","doi-asserted-by":"crossref","unstructured":"Lopez, D., Gunasekaran, M., Murugan, B. S., Kaur, H., & Abbas, K. M. (2014). Spatial BigData analytics of influenza epidemic in Vellore, India. In Proceedings of 2014 IEEE international conference on big data (pp. 19\u201324). IEEE.","DOI":"10.1109\/BigData.2014.7004422"},{"key":"5284_CR13","doi-asserted-by":"crossref","unstructured":"Lopez, D., & Gunasekaran, M. (2015). Assessment of vaccination strategies using fuzzy multicriteriadecision making. In Proceedings of the fifth international conference on fuzzy and neurocomputing (FANCCO-2015) (pp. 195\u2013208). Springer International.","DOI":"10.1007\/978-3-319-27212-2_16"},{"key":"5284_CR14","unstructured":"Data Breach Investigations Report. (2016). Verizon ( http:\/\/www.verizonenterprise.com\/verizon-insightslab\/dbir\/2016\/ ."},{"key":"5284_CR15","unstructured":"Kaur, J., Gobindgarh, M., & Garg, S. (2015). S. R. I. M. T. Principal. In Survey paper on security in cloud computing."},{"key":"5284_CR16","unstructured":"http:\/\/cloudspectator.com\/best-cloud-providers-2016 ."},{"key":"5284_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/9781118821930.ch17","volume-title":"Cloud security: Issues and concerns. Encyclopedia on Cloud Computing","author":"P Samarati","year":"2016","unstructured":"Samarati, P., & di Vimercati, S. D. C. (2016). Cloud security: Issues and concerns. Encyclopedia on Cloud Computing. New York: Wiley."},{"issue":"1","key":"5284_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1\u201311.","journal-title":"Journal of Network and Computer Applications"},{"key":"5284_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/jit.2014.25","volume":"31","author":"S Schneider","year":"2014","unstructured":"Schneider, S., & Sundae, A. (2014). Determinant factors of cloud sourcing decisions. Journal of Information Technology, 31, 1\u201331.","journal-title":"Journal of Information Technology"},{"key":"5284_CR20","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.ijid.2016.02.084","volume":"45","author":"D Lopez","year":"2016","unstructured":"Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics\u2014A big data perspective. International Journal of Infectious Diseases, 45, 23\u201324.","journal-title":"International Journal of Infectious Diseases"},{"key":"5284_CR21","unstructured":"Manogaran, G., Vijayakumar, V., Varatharajan, R., Kumar, P. M., Sundarasekar, R., & Hsu, C. H. (2017). Machine learning based big data processing framework for cancer diagnosis using hidden markov model and gm clustering. Wireless Personal Communications 1\u201318."},{"key":"5284_CR22","unstructured":"Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications 1\u201321."},{"key":"5284_CR23","doi-asserted-by":"crossref","unstructured":"Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for iot and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141\u2013154). IGI Global.","DOI":"10.4018\/978-1-5225-2947-7.ch011"},{"key":"5284_CR24","first-page":"1","volume":"9","author":"G Manogaran","year":"2016","unstructured":"Manogaran, G., & Lopez, D. (2016). Health data analytics using scalable logistic regression with stochastic gradient descent. International Journal of Advanced Intelligence Paradigms, 9, 1\u201315.","journal-title":"International Journal of Advanced Intelligence Paradigms"},{"key":"5284_CR25","doi-asserted-by":"crossref","unstructured":"Manogaran, G., Thota, C., Lopez, D., Vijayakumar, V., Abbas, K. M., & Sundarsekar, R. (2017). Big data knowledge system in healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 133\u2013157). Springer International Publishing.","DOI":"10.1007\/978-3-319-49736-5_7"},{"issue":"2","key":"5284_CR26","doi-asserted-by":"publisher","first-page":"88","DOI":"10.4018\/IJACI.2017040106","volume":"8","author":"G Manogaran","year":"2017","unstructured":"Manogaran, G., & Lopez, D. (2017). Disease surveillance system for big climate data processing and dengue transmission. International Journal of Ambient Computing and Intelligence (IJACI), 8(2), 88\u2013105.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"key":"5284_CR27","doi-asserted-by":"crossref","unstructured":"Manogaran, G., Lopez, D., Thota, C., Abbas, K. M., Pyne, S., & Sundarasekar, R. (2017). Big data analytics in healthcare Internet of Things. In Innovative healthcare systems for the 21st century (pp. 263\u2013284). Springer International Publishing.","DOI":"10.1007\/978-3-319-55774-8_10"},{"issue":"2\u20134","key":"5284_CR28","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1504\/IJBET.2017.087722","volume":"25","author":"G Manogaran","year":"2017","unstructured":"Manogaran, G., & Lopez, D. (2017). A survey of big data architectures and machine learning algorithms in healthcare. International Journal of Biomedical Engineering and Technology, 25(2\u20134), 182\u2013211.","journal-title":"International Journal of Biomedical Engineering and Technology"},{"key":"5284_CR29","doi-asserted-by":"crossref","unstructured":"Manogaran, G., Thota, C., & Lopez, D. (2018). Human-computer interaction with big data analytics. In HCI challenges and privacy preservation in big data security (pp. 1\u201322). IGI Global.","DOI":"10.4018\/978-1-5225-2863-0.ch001"},{"key":"5284_CR30","doi-asserted-by":"crossref","unstructured":"Kumar, P. M., Gandhi, U., Varatharajan, R., Manogaran, G., Jidhesh, R., & Vadivel, T. (2017). Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things. Cluster Computing 1\u201312.","DOI":"10.1007\/s10586-017-1323-4"},{"key":"5284_CR31","doi-asserted-by":"crossref","unstructured":"Lopez, D., & Manogaran, G. (2017). Parametric model to predict H1N1 influenza in Vellore District, Tamil Nadu, India. In Handbook of Statistics (Vol. 37, pp. 301\u2013316). Elsevier.","DOI":"10.1016\/bs.host.2017.09.005"},{"key":"5284_CR32","unstructured":"Manogaran, G., Varatharajan, R., & Priyan, M. K. (2017). Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Applications 1\u201321."},{"key":"5284_CR33","unstructured":"Varatharajan, R., Manogaran, G., Priyan, M. K., Bala\u015f, V. E., & Barna, C. (2017). Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimedia Tools and Applications 1\u201321."},{"key":"5284_CR34","unstructured":"Varatharajan, R., Vasanth, K., Gunasekaran, M., Priyan, M., & Gao, X. Z. (2017). An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Computers & Electrical Engineering."},{"key":"5284_CR35","unstructured":"Varatharajan, R., Manogaran, G., Priyan, M. K., & Sundarasekar, R. (2017). Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Cluster Computing 1\u201310."},{"key":"5284_CR36","unstructured":"Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications 1\u201321."},{"key":"5284_CR37","unstructured":"Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2017). A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting. Future Generation Computer Systems."},{"key":"5284_CR38","doi-asserted-by":"crossref","unstructured":"Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for iot and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141\u2013154). IGI Global.","DOI":"10.4018\/978-1-5225-2947-7.ch011"},{"issue":"3","key":"5284_CR39","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1007\/s11277-017-5044-z","volume":"102","author":"Gunasekaran Manogaran","year":"2017","unstructured":"Manogaran, G., Vijayakumar, V., Varatharajan, R., Kumar, P. M., Sundarasekar, R., & Hsu, C. H. (2017). Machine learning based big data processing framework for cancer diagnosis using hidden markov model and GM clustering. Wireless Personal Communications, 1\u201318. https:\/\/doi.org\/10.1007\/s11277-017-5044-z .","journal-title":"Wireless Personal Communications"},{"key":"5284_CR40","doi-asserted-by":"crossref","unstructured":"Ratliff, Z. B., Kuhn, D. R., Kacker, R. N., Lei, Y., & Trivedi, K. S. (2016). The relationship between software bug type and number of factors involved in failures. In 2016 IEEE international symposium on software reliability engineering workshops (ISSREW) (pp. 119\u2013124). IEEE.","DOI":"10.1109\/ISSREW.2016.26"},{"key":"5284_CR41","doi-asserted-by":"crossref","unstructured":"Suresh, A., & Varatharajan, R. (2017). Competent resource provisioning and distribution techniques for cloud computing environment. Cluster Computing 1\u20138.","DOI":"10.1007\/s10586-017-1293-6"},{"key":"5284_CR42","doi-asserted-by":"crossref","unstructured":"Vishwanath, K. V., & Nagappan, N. (2010). Characterizing cloud computing hardware reliability. In Proceedings of the 1st ACM symposium on cloud computing. ACM.","DOI":"10.1145\/1807128.1807161"},{"key":"5284_CR43","doi-asserted-by":"crossref","unstructured":"Oualha, N., Onen, M., & Roudier, Y. (2008). A security protocol for self-organizing data storage. In Tech. Rep. EURECOM+2399, Institut Eurecom, 2008, France.","DOI":"10.1007\/978-0-387-09699-5_44"},{"issue":"6","key":"5284_CR44","first-page":"1694","volume":"8","author":"P Siam Kumar","year":"2011","unstructured":"Siam Kumar, P., & Subramanian, R. (2011). An efficient and secure protocol for ensuring data storage security in cloud computing. IJCSI International Journal of Computer Science Issues, 8(6), 1694\u20131814.","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"5284_CR45","unstructured":"Deswarte, Y., Quisquater, J.-J., & Saidane, A. (2003). Remote integrity checking. In Proceedings of Conference on integrity and internal control in information systems (IICIS\u201903), November 2003. Lausanne, Switzerland."},{"key":"5284_CR46","unstructured":"Filho, D. L. G., & Barreto, P. S. L. M. (2006). Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006\/150, 2006, http:\/\/eprint.iacr.org\/ ."},{"key":"5284_CR47","doi-asserted-by":"crossref","unstructured":"Caroni, G., & Wald Vogel, M. (2003). Establishing trust in distributed storage providers. In Third IEEE P2P Conference, Linkoping 03.","DOI":"10.1109\/PTP.2003.1231512"},{"key":"5284_CR48","doi-asserted-by":"crossref","unstructured":"Boneh, D., di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with a keyword search. In Advances in Cryptology EUROCRYPT \u201804, vol. 3027 of Lecture notes in computer science (pp. 506\u2013522).","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"5284_CR49","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lu, H., & Weng, J. (2011). Multi-user private keyword search for cloud computing. In Proceedings of IEEE third international conference on cloud com (Vol. 29, pp. 264\u2013271).","DOI":"10.1109\/CloudCom.2011.43"},{"key":"5284_CR50","unstructured":"Kudtarkar, P. P., Pagare, J. D., Ahire, S. R., & Pawar, T. S. (2015). Enhanced file security using encryption and splitting technique over multi-cloud environment."},{"key":"5284_CR51","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2011). Privacy preserving multi keyword ranked search over encrypted cloud data. In 30th IEEE conference on computer communications (pp. 829\u2013837).","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"5284_CR52","unstructured":"Vandijk, M., Gentry, C., Halevi, S., & Vaikuntanathan, V. (2009). Fully homomorphic encryption over the integers. http:\/\/eprint.iacr.org\/.2009 ."},{"issue":"9","key":"5284_CR53","first-page":"18","volume":"2","author":"VR Pancholi","year":"2016","unstructured":"Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18\u201321.","journal-title":"International Journal for Innovative Research in Science and Technology"},{"issue":"2","key":"5284_CR54","first-page":"341","volume":"3","author":"PV Nithyabharathi","year":"2014","unstructured":"Nithyabharathi, P. V., Kosalya, T., & Baskar, V. (2014). To enhance multimedia security in cloud computing environment using RSA and AES. International Journal of Science Engineering and Technology Research (IJSETR), 3(2), 341\u2013345.","journal-title":"International Journal of Science Engineering and Technology Research (IJSETR)"},{"issue":"5","key":"5284_CR55","first-page":"157","volume":"3","author":"RS Ghavghave","year":"2015","unstructured":"Ghavghave, R. S., & Khatwar, D. M. (2015). Architecture for data security in multicloud using AES-256 encryption algorithm. International journal on recent and innovation trends in computing and communication, 3(5), 157\u2013161.","journal-title":"International journal on recent and innovation trends in computing and communication"},{"issue":"4","key":"5284_CR56","first-page":"1922","volume":"3","author":"R Arora","year":"2013","unstructured":"Arora, R., & Parashar, A. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications (IJERA)., 3(4), 1922\u20131926.","journal-title":"International Journal of Engineering Research and Applications (IJERA)."},{"key":"5284_CR57","doi-asserted-by":"crossref","unstructured":"Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5256.","DOI":"10.17487\/rfc5246"},{"key":"5284_CR58","unstructured":"Dierks, T., & Rescorla, E. (2014). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Draft."},{"key":"5284_CR59","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Leurent, G., Cad\u00e9, D., Blanchet, B., Paraskevopoulou, Z., & Hri\u0163cu, C. et al. (2016). Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH. In Network and distributed system security symposium\u2013NDSS 2016.","DOI":"10.14722\/ndss.2016.23418"},{"issue":"7","key":"5284_CR60","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MC.2013.254","volume":"46","author":"KM Khan","year":"2013","unstructured":"Khan, K. M., & Malluhi, Q. (2013). Trust in cloud services: Providing more controls to clients. Computer, 46(7), 94\u201396.","journal-title":"Computer"},{"issue":"2","key":"5284_CR61","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2408776.2408789","volume":"56","author":"A Sunyaev","year":"2013","unstructured":"Sunyaev, A., & Schneider, S. (2013). Cloud services certification. Communications of the ACM, 56(2), 33\u201336.","journal-title":"Communications of the ACM"},{"issue":"2","key":"5284_CR62","doi-asserted-by":"publisher","first-page":"95","DOI":"10.4018\/IJRSDA.2018040105","volume":"5","author":"BS Rawal","year":"2018","unstructured":"Rawal, B. S., Liang, S., Gautam, S., Kalutarage, H. K., & Vijayakumar, P. (2018). Nth order binary encoding with split-protocol. International Journal of Rough Sets and Data Analysis (IJRSDA), 5(2), 95\u2013118. (in press).","journal-title":"International Journal of Rough Sets and Data Analysis (IJRSDA)"},{"key":"5284_CR63","unstructured":"http:\/\/pluto.ksi.edu\/~cyh\/cis370\/ebook\/ch02c.htm ."},{"key":"5284_CR64","doi-asserted-by":"crossref","unstructured":"Rawal, B., Karne, R., Wijesinha, A., Ramcharan, H., & Liang, S. (2012). A split protocol technique for web server migration. In 2012 IEEE 9th international conference on mobile adhoc and sensor systems (MASS) (pp. 1\u20136). IEEE.","DOI":"10.1109\/MASS.2012.6708528"},{"key":"5284_CR65","doi-asserted-by":"publisher","unstructured":"Rawal, B. S., Karne, R. K., & Wijesinha, A. L. (2011). Splitting HTTP requests on two servers. In 2011 third international conference on communication systems and networks (COMSNETS) (pp. 1\u20138). IEEE. https:\/\/doi.org\/10.1109\/COMSNETS.2011.5716484 .","DOI":"10.1109\/COMSNETS.2011.5716484"},{"key":"5284_CR66","unstructured":"IEEE 802-2001 Standard for local and metropolitan area networks: Overview and architecture. http:\/\/standards.ieee.org\/getieee802\/802.html ."},{"key":"5284_CR67","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., & Morrow, M. (2009) Blueprint for the intercloud-protocols and formats for cloud computing interoperability. In Fourth international conference on internet and web applications and services, 2009. ICIW\u201909 (pp. 328\u2013336). IEEE.","DOI":"10.1109\/ICIW.2009.55"},{"key":"5284_CR68","doi-asserted-by":"publisher","first-page":"99","DOI":"10.5121\/ijcnc.2015.7407","volume":"7","author":"BS Rawal","year":"2015","unstructured":"Rawal, B. S. (2015). Attack countermeasure tree (ACT) meets with the split-protocol. International Journal of Computer Networks & Communications, 7, 99\u2013113. https:\/\/doi.org\/10.5121\/ijcnc.2015.7407 .","journal-title":"International Journal of Computer Networks & Communications"},{"key":"5284_CR69","unstructured":"Rawal B. S., Duan, Q., & Vijayakumar, P. Dissection of the experimental outcome of split-protocol. International Journal of Advanced Intelligence Paradigms. In the press of Inderscience Publishers."},{"issue":"1","key":"5284_CR70","doi-asserted-by":"publisher","first-page":"14","DOI":"10.14419\/jacst.v5i1.6181","volume":"5","author":"BS Rawal","year":"2016","unstructured":"Rawal, B. S., Eberhardt, G., & Lee, J. (2016). Cybersecurity snapshot: Google, twitter, and other online databases. Journal of Advanced Computer Science & Technology, 5(1), 14\u201322.","journal-title":"Journal of Advanced Computer Science & Technology"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5284-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5284-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5284-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T11:25:37Z","timestamp":1570620337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5284-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,19]]},"references-count":70,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["5284"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5284-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,19]]},"assertion":[{"value":"19 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}