Security analysis of blowfish algorithm
Alabaichi, Ashwak, Ahmad, Faudziah, Mahmod, Ramlan
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
A black-box testing tool for detecting SQL injection vulnerabilities
Djuric, Zoran
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Classification of liver disease diagnosis: A comparative study
Bahramirad, Sina, Mustapha, Aida, Eshraghi, Maryam
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
GramFuzz: Fuzzing testing of web browsers based on grammar analysis and structural mutation
Tao Guo, Puhan Zhang, Xin Wang, Qiang Wei
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Tamper detection and recovery of medical image watermarking using modified LSB and Huffman compression
Adiwijaya, Faoziyah, P. N., Permana, F. P., Wirayuda, T. A. B., Wisesty, U. N.
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
E-government services challenges and opportunities for developing countries: The case of Libya
Ahmed, Alsanossi M., Mehdi, Qasim H., Moreton, Robert, Elmaghraby, Adel
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
An analysis of key factors affecting user acceptance of mobile payment
Yu Tian, Hao Dong
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Practical application of model predictive control to fractional thermal system
Rhouma, Aymen, Bouzouita, Badreddine, Bouani, Faouzi
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Job scheduling for dynamic data replication strategy in heterogeneous federation data grid systems
Zarina, M., Ahmad, Fadhilah, bin Mohd Rose, Ahmad Nazari, Nordin, M., Deris, M. Mat
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Hand biometrics: Overview and user perception survey
Al Eidan, Rasha M.
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Current cyber security threats and challenges in critical infrastructures protection
Kozik, Rafal, Choras, Michal
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Mobile recommender systems: An overview of technologies and challenges
Polatidis, Nikolaos, Georgiadis, Christos K.
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Applying transductive learning for automatic term extraction: The case of the ecology domain
Conrado, Merley S., Rossi, Rafael G., Pardo, Thiago A. S., Rezende, Solange O.
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
A new theoretical modeling for the Nyquist pulses processing used widely over communication channels for systems with high transmission rates
Caputo, Robinson G., Figueiredo, Gustavo V., Silveira, Mauricio
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Innovative theoretical modeling for the pulse point level detection on A/D converters involving pulse position modulation
Caputo, Robinson G., Figueiredo, Gustavo V., Silveira, Mauricio
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding
Requirements based testing of software
Sarwar, Tabinda, Habib, Wajiha, Arif, Fahim
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Published in 2013 Second International Conference on Informatics & Applications (ICIA) (01.09.2013)
Get full text
Conference Proceeding