Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS
Ronak Shah
Computer Science & Information Technology
6, 9, November, 2016
Precise Performance Characterization of Antivirus on the File System Operations
Mohammed I. Al-Saleh , Hanan M. Hamdan
Computer Science & Information Technology
25, 9, September, 2019
AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGORITHM
Rajesh Kumar Sahoo
Computer Science & Information Technology
6, 9, November, 2016
A Novel Self-adaptive Grid-partitioning Noise Optimization Algorithm Based on Differential Privacy
Zhaobin Liu1 , Haoze Lv1 , Minghui Li1 , Zhiyang Li1 , and Zhiyi Huang2
Computer Science & Information Technology
16, 3, October, 2019
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
J¸edrzej Bieniasz, Monika St¸epkowska Artur Janicki, and Krzysztof Szczypiorski
Computer Science & Information Technology
25, 9, September, 2019
A Novel Self-adaptive Grid-partitioning Noise Optimization Algorithm Based on Differential Privacy
Zhaobin Liu1 , Haoze Lv1 , Minghui Li1 , Zhiyang Li1 , and Zhiyi Huang2
Computer Science & Information Technology
16, 3, October, 2019
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
Hui Tian ,Meilun Huang ,Chin-Chen Chang ,Yongfeng Huang ,Jing Lu,Yongqian Du
Computer Science & Information Technology
25, 9, September, 2019
AUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHS
Soumajit Adhya
Computer Science & Information Technology
6, 9, November, 2016
A SURVEY ON SECURITY RISK MANAGEMENT FRAMEWORKS IN CLOUD COMPUTING
Rana Alosaimi
Computer Science & Information Technology
6, 9, November, 2016
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
Muhammad A. Iqba
Computer Science & Information Technology
6, 11, November, 2016
Research of MDCOP Mining Based on Time Aggregated Graph for Large Spatio-temproal Data Sets
Zhanquan Wang1,2 , Taoli Han1 , and Huiqun Yu1,2
Computer Science & Information Technology
16, 3, October, 2019
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images
Mingying Huang Ming Xu Tong Qiao Ting Wu Ning Zheng
Computer Science & Information Technology
25, 9, October, 2019
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON-UNIFORMITY (G-PRNU)
M.Al-Athamneh
Computer Science & Information Technology
6, 11, November, 2016
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach
Ziad A. Al-Sharif, Mohammed I. Al-Saleh Yaser Jararweh, Luay Alawneh, Ahmed S. Shatnawi
Computer Science & Information Technology
25, 9, September, 2019
Digital Investigation of IoT Devices in the Criminal Scene
François Bouchaud ,Gilles Grimaud ,Thomas Vantroys,Pierrick Buret
Computer Science & Information Technology
25, 9, September, 2019
FACIAL EXPRESSION RECOGNITION USING DIGITALISED FACIAL FEATURES BASED ON ACTIVE SHAPE MODEL
Nan Sun
Computer Science & Information Technology
6, 11, November, 2016
FILE SYNCHRONIZATION SYSTEMS SURVEY
Zulqarnain Mehdi
Computer Science & Information Technology
6, 11, November, 2016
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119