International Journal of Cloud Applications and Computing (IJCAC)
2011 - 2026
Current editor(s): B. B. Gupta From IGI Global Scientific Publishing Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 16, issue 1, 2026
- A Novel and Extremely Fast Saturation Less Circuit Breaker Using Non-Mechanical Components pp. 1-18

- Samira Mohamed Hassan Shaloh, Shakeel Ahmad Sofi, Amaan Abbas, Sarwar Khawaja, Fayyaz Hussain Qureshi, Hafsa Hassan, Azadeh Amoozegar, Tilwani and Huda Majeed
- From Mission-Critical to Smart Homes: A Decentralized Software-Defined MANETs and Fault-Tolerant Architecture for IoT and Smart Environments pp. 1-26

- Elhadj Benkhelifa, Tamara Zhukabayeva, Pradeeban Kathiravelu and Sasikala Selvamani
- End-to-End Security for SDN Controllers in Distributed K8s Environments for Fog and Cloud pp. 1-30

- Asad Khan and Priyadarsi Nanda
Volume 15, issue 1, 2025
- Transformation of External Auditors in Audit Practices Through the Use of Cloud Technology pp. 1-30

- Muhamad Raihan and Heny Kurniawati
- Analyzing the Influence of Legal and Regulatory Challenges and Organizational Change Management on Blockchain Adoption in Project Management pp. 1-27

- Mohamed Arif Al Ali and Mohammad Mohammad Khan
- Comprehensive Evaluation of XBNet for Multi-Class IoT Attack Detection pp. 1-26

- Iman Akour, Mohammad Alauthman, Ammar Almomani, Ramakrishnan Raman and Varsha Arya
- Information Theory-Based DDoS Attack Detection in Cloud Computing: A Systematic Survey of Approaches, Challenges, and Future Directions pp. 1-38

- Mohammad Alarqan, Bahari Belaton, Ammar Almomani, Mohammad Alauthman, Mohammed Azmi Al-Betar and Varsha Arya
- Unified Transformer Framework for Automated Cyberbullying Detection pp. 1-29

- Enas Alikhashashneh, Hedaia Alsawan, Khalid M. O. Nahar, Nahla Shatnawi, Ammar Almomani, Mohammad Alauthman, Shavi Bansal and Vincent Shin-Hung Pan
- Mobile Cloud Computing: A Comparison Study of Cuckoo and Aiolos Offloading Frameworks pp. 1-35

- Sanjay P. Ahuja and Inan Kaddour
- The Evolution of Cloud Computing Architectures: A Comparative Analysis of Traditional Virtualization and Containerization Technologies pp. 1-15

- Hedia Zardi, Walid Karamti, Thuraya Alwehaid, Shahad Almisned and Wajd Alsalloum
- Financial Perspectives of Business Services Migration to the Cloud in Public Sector pp. 1-28

- Ana Kundai Muchandigona
Volume 14, issue 1, 2024
- Custom Network Protocol Stack for Communication Between Nodes in a Cloudlet System pp. 1-24

- Manoj Subhash Kakade, K.R. Anupama, Sushil Nayak and Swarnab Garang
- Using Supervised Learning to Detect Command and Control Attacks in IoT pp. 1-19

- Muath AlShaikh, Waleed Alsemaih, Sultan Alamri and Qusai Ramadan
- Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting pp. 1-17

- Abdelraouf Ishtaiwi, Ali Mohd Ali, Ahmad Al-Qerem, Mohammad Sabahean, Bilal Alzubi, Ammar Almomani, Mohammad Alauthman, Amjad Aldweesh and Mohammad A. Al Khaldy
- Transforming Application Development With Serverless Computing pp. 1-16

- Suliman Mohamed Fati and Mamdouh Alenezi
- Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques pp. 1-30

- Utsav Upadhyay, Alok Kumar, Gajanand Sharma, Ashok Kumar Saini, Varsha Arya, Akshat Gaurav and Kwok Tai Chui
Volume 13, issue 1, 2023
- Performance Evaluation of Hybrid Meta-Heuristics-Based Task Scheduling Algorithm for Energy Efficiency in Fog Computing pp. 1-16

- Ali Garba Jakwa, Abdulsalam Yau Gital, Souley Boukari and Fatima Umar Zambuk
- An Adaptable Approach to Fault Tolerance in Cloud Computing pp. 1-24

- Priti Kumari and Parmeet Kaur
- Empirical Comparison of Energy Efficiency Between 3-Tier and High-Speed 3-Tier Network Topologies pp. 1-28

- Manal Alkoshman and Saleh Atiewi
- Integration of the Internet of Things and Cloud: Security Challenges and Solutions – A Review pp. 1-30

- Chellammal Surianarayanan and Pethuru Raj Chelliah
- Sociocultural Factors in Times of Global Crisis pp. 1-21

- Maximiliano Perez and David Coello
- Privacy Protection of Cloud Computing Based on Strong Forward Security pp. 1-9

- Fengyin Li, Junhui Wang and Zhihao Song
- A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks pp. 1-22

- B. V. Subba Rao, Vivek Sharma, Neeraj Rathore, Devendra Prasad, Harishchander Anandaram and Gaurav Soni
- Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment pp. 1-25

- Kamlesh Lakhwani, Gajanand Sharma, Ramandeep Sandhu, Naresh Kumar Nagwani, Sandeep Bhargava, Varsha Arya and Ammar Almomani
- An Efficient ECK-Secured FCM-Based Firefly Optimization Algorithm for Dynamic Resource Sharing in Multi-Tenant SaaS Service Clouds pp. 1-14

- Pallavi G. B.
- A RYU-SDN Controller-Based VM Migration Scheme Using SD-EAW Ranking Methods for Identifying Active Jobs in the 5G Cloud Framework pp. 1-18

- Grace Shalini T. and Rathnamala S.
- Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols pp. 1-26

- Ala Hamarsheh, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani and Someah Alangari
Volume 12, issue 2, 2022
- Resource Optimization in Cloud Data Centers Using Particle Swarm Optimization pp. 1-12

- Madhumala R. B., Harshvardhan Tiwari and Devaraj Verma C.
- Stock Market E-Assistance on Platform-as-a-Service (PaaS) pp. 1-11

- Shahul Chettali Hameed
- Resource-Efficient Pareto-Optimal Green Scheduler Architecture pp. 1-14

- Urmila Shrawankar and Chetan Ashokrao Dhule
- A Cost-Optimized Data Parallel Task Scheduling in Multi-Core Resources Under Deadline and Budget Constraints pp. 1-16

- Saravanan Krishnan and Rajalakshmi N. R.
Volume 12, issue 1, 2022
- A Novel Decentralized Group Key Management Scheme for Cloud-Based Vehicular IoT Networks pp. 1-34

- Rakesh Kumar, Sunil K. Singh, D. K. Lobiyal, Kwok Tai Chui, Domenico Santaniello and Marjan Kuchaki Rafsanjani
- Enhancing the Security and Performance of Cloud for E-Governance Infrastructure: Secure E-MODI pp. 1-23

- Hemraj Shobharam Lamkuche, Vijaya Bhaskar Kondaveety, Vijaya Lakshmi Sapparam, Shruti Singh and Raj Deepak Rajpurkar
- Performance Evaluation of Contiguous and Noncontiguous Processor Allocation Based on Common Communication Patterns for 2D Mesh Interconnection Network pp. 1-21

- Areen Al Abass, Saad Bani-Mohammad and Ismail Ababneh
- A Heuristic-Based Task Scheduling Policy for QoS Improvement in Cloud pp. 1-22

- Gaurav Tripathi and Rakesh Kumar
- Migration From DevOps to DevSecOps: A Complete Migration Framework, Challenges, and Evaluation pp. 1-15

- Nisha T. N. and Amit Khandebharad
- Load and Cost-Aware Min-Min Workflow Scheduling Algorithm for Heterogeneous Resources in Fog, Cloud, and Edge Scenarios pp. 1-20

- Jyoti Bisht and Venkata Subrahmanyam Vampugani
- SMA-LinR: An Energy and SLA-Aware Autonomous Management of Virtual Machines pp. 1-24

- Varun Barthwal, Manmohan Singh Rauthan and Rohan Varma
- Capability-Based Access Control With Trust for Effective Healthcare Systems pp. 1-28

- Shweta Kaushik, Charu Gandhi and Charu Gandhi
- Analysis of Security-Based Access Control Models for Cloud Computing pp. 1-19

- Sandeep Choudhary and Nanhay Singh
- RDF Query Path Optimization Using Hybrid Genetic Algorithms: Semantic Web vs. Data-Intensive Cloud Computing pp. 1-16

- Qazi Mudassar Ilyas, Muneer Ahmad, Sonia Rauf and Danish Irfan
- Review on Mapping of Tasks to Resources in Cloud Computing pp. 1-17

- Vinothina V., Jasmine Beulah G. and Sridaran Rajagopal
- A Comprehensive Survey on Cloud Computing: Architecture, Tools, Technologies, and Open Issues pp. 1-33

- Md Saquib Jawed and Mohammad Sajid
- An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup pp. 1-27

- Umesh Kumar and V. Ch. Venkaiah
- A Metaphoric Design of Electronic Medical Record (EMR) for Periodic Health Examination Reports: An Initiative to Cloud's Medical Data Analysis pp. 1-18

- Sharifah Ahmed Alamer, Qazi Mudassar Ilyas, Muneer Ahmad and Danish Irfan
- An Adaptive Mechanism for Virtual Machine Migration in the Cloud Environment pp. 1-10

- Gurpreet Singh, Manisha Malhotra and Ajay Sharma
- Device Access Control and Key Exchange (DACK) Protocol for Internet of Things pp. 1-14

- Md Alimul Haque, Nourah Almrezeq, Shameemul Haque and A.A. Abd El-Aziz
- A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing pp. 1-11

- Bineet Joshi, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta and Dragan Peraković
- AFTTM: Agent-Based Fault Tolerance Trust Mechanism in Cloud Environment pp. 1-12

- Shivani Jaswal and Manisha Malhotra
- Integrated Predictive Experience Management Framework (IPEMF) for Improving Customer Experience: In the Era of Digital Transformation pp. 1-13

- Neelesh Ragunath Kumbhojkar and Arun Balakrishna Menon
| |