PREDICTING SECURITY CRITICAL CONDITIONS OF CYBER PHYSICAL SYSTEMS WITH UNOBSERVABLES AND OBSERVATION TIMES |
Alessio Coletta |
Computer Science & Information Technology |
8, 18, December, 2018 |
CAMOUFLAGED WITH SIZE: A CASE STUDY OF ESPIONAGE USING ACQUIRABLE SINGLE-BOARD COMPUTERS |
Kiavash Satvat1 , Mahshid Hosseini1 and Maliheh Shirvanian2 |
Computer Science & Information Technology |
8, 18, December, 2018 |
DATA MANAGEMENT PLATFORM SUPPORTING VOLUNTEER OCCUPATION SERVICES |
Damien Nicolas, Adnan Emeri, Marie Laure Watrinet and Djamel Khadraoui |
Computer Science & Information Technology |
8, 18, December, 2018 |
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING |
Shelia Rahman1,Afroza Sultana2 , Afsana Islam3, and Md Whaiduzzaman |
Computer Science & Information Technology |
10, 4, August, 2018 |
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS |
Heba Elgazzar1 and Adel Elmaghraby |
Computer Science & Information Technology |
10, 4, August, 2018 |
APPLICATION DEVELOPMENT TO CONVERT HETEROGENEOUS INFORMATION INTO PQDIF (POWER QUALITY DATA INTERCHANGE FORMAT) |
Claudiu Popirlan |
Computer Science & Information Technology |
10, 4, August, 2018 |
VIRTUAL AIS GENERATION MANAGEMENT SYSTEM FOR WATERWAY RISK ASSESSMENT |
Jun Sik Kim1 , Seung Wook Hong2 and Suhyun Park3 |
Computer Science & Information Technology |
8, 18, December, 2018 |
VIRTUAL AIS GENERATION MANAGEMENT SYSTEM FOR WATERWAY RISK ASSESSMENT |
Jun Sik Kim1 , Seung Wook Hong2 and Suhyun Park3 |
Computer Science & Information Technology |
8, 18, December, 2018 |
AGILE PROJECT MANAGEMENT IN NON-SOFTWARE SECTORS DURING TURBULENT TIMES |
Nabeel T. Alsohybe, Nashwan Sabrah |
Software Engineering & Security |
10, 1, January, 2019 |
A Reliable and an Efficient Web Testing System |
Kamran Ali |
Software Testing |
Vol 10, Issue 1, January, 2019 |
FUZZY BOOLEAN REASONING FOR DIAGNOSIS OF DIABETES |
Mohamed Benamina, Baghdad Atmani and Sofia Benbelkacem |
Computer Science & Information Technology |
8, 18, December, 2018 |
Extending a model for ontology-based Arabic-English machine translation |
Neama Abdulaziz Dahan and Fadl Mutaher Ba-Alwi |
Machine Learning |
10, 1, January, 2019 |
COMPUTER VISION-BASED FALL DETECTION METHODS USING THE KINECT CAMERA: A SURVEY |
Salma Kammoun Jarraya |
Computer Science & Information Technology |
10, 5, October, 2018 |
MODELS OF IT-PROJECT MANAGEMENT |
Julia Doronina and Ekaterina Doronina |
Computer Science & Information Technology |
10, 5, October, 2018 |
Open Source Technology : An Emerging and Vital Paradigm in Institutions of Learning in Kenya |
Cosmas Kabii Muthamia , Gregory Wanyembi, Nahason Matoke |
Computer Science & Information Technology |
10, 5, October, 2018 |
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAVIOR USING A VALIDATED MULTIPLE REGRESSION MODELS |
Mofleh Al-diabat |
Computer Science & Information Technology |
10, 6, December, 2018 |
REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA NETWORK ENVIRONMENT |
Marisa Buctuanon |
Computer Science & Information Technology |
10, 6, December, 2018 |
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CONGESTION IN MULTICAST NETWORKS |
Deepa V B |
Computer Science & Information Technology |
10, 6, December, 2018 |
TEXT MINING CUSTOMER REVIEWS FOR ASPECTBASED RESTAURANT RATING |
Jovelyn C. Cuizon , Jesserine Lopez and Danica Rose Jones |
Computer Science & Information Technology |
10, 6, December, 2018 |
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH ANALYSIS OF THE COVER IMAGE AND THE ENCRYPTED MESSAGE |
Martha Angelica Garcia-Villa |
Computer Science & Information Technology |
10, 6, December, 2018 |