Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
  • Rafa l Kozik ,Micha l Chora´,J¨org Keller
  • Computer Science & Information Technology
  • 25, 1, January, 2019

  • ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT
  • Xiaojia He
  • Computer Science & Information Technology
  • 6, 13, November, 2016

  • SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES AND CHALLENGES
  • Sara Farahmandian and Doan B Hoang
  • Computer Science & Information Technology
  • 6, 15, December, 2016

  • Design of a Secure Disaster Notification System Using the Smartphone Based Beacon
  • Jae Pil Lee1 and Jae Gwang Lee2 and Jun hyeon Lee3 Ki-su Yoon4 and Jae Kwang Lee5
  • Computer Science & Information Technology
  • 6, 15, December, 2016

  • DICTIONARY BASED AMHARIC-ARABIC CROSS LANGUAGE INFORMATION RETRIEVAL
  • H L Shashirekha
  • Computer Science & Information Technology
  • 6, 14, November, 2016

  • TOPIC BASED ANALYSIS OF TEXT CORPORA
  • Madhumita Gupta
  • Computer Science & Information Technology
  • 6, 14, November, 2016

  • RECOGNITION OF RECAPTURED IMAGES USING PHYSICAL BASED FEATURES
  • S. A. A. H. Samaraweera
  • Computer Science & Information Technology
  • 6, 14, November, 2016

  • COMPUTATIONAL METHODS FOR FUNCTIONAL ANALYSIS OF GENE EXPRESSION
  • Houda Fyad
  • Computer Science & Information Technology
  • 6, 14, November, 2016

  • AN AUGMENTED INTELLIGENCE MODEL TO EXTRACT PRAGMATIC MARKERS
  • Vijay Perincherry
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • Mitigate Content Poisoning Attack in NDN by Namespace Authorization
  • Pengfei Yue and Bin Pang
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • Information –Symmetry and Feynman-Diagrams Applied to Computing Models
  • Carlos J. Martinez, Ana Gonzalez
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • Cyber Security Insights into Self-Proclaimed Virtual World Hackers
  • Nicholas Patterson, Michael Hobbs, Frank Jiang and Lei Pan
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • The Feasibility of Using Behavioural Profiling Technique for Mitigating Insider Threats: Review
  • Gaseb Alotibi, Nathan Clarke, Fudong Li and Steven Furnell
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • Rate Distortion Study for Time Varying Autoregressive Gaussian Process
  • Jia-Chyi Wu
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • Inspection of Methods of Empirical Mode Decomposition
  • Roberto Hernández Santander and Esperanza Camargo Casallas
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • Multi-Variable Linear Regression-Based Prediction of A Computationally-Heavy Link Stability Metric for Mobile Sensor Networks
  • Natarajan Meghanathan
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • Security Framework for IoT Devices against Cyber-Attacks
  • Aliya Tabassum and Wadha Lebda
  • Computer Science & Information Technology
  • 9, 13, November, 2019

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals