SR |
M-CODE |
CITATION |
|
1 |
|
Dolz, M. F., Astorga, D. D. R., Fernández, J., GarcÃa, J. D., & Carretero, J. (2018). Towards Automatic Parallelization of Stream Processing Applications. IEEE Access, 6, 39944-39961. |
|
2 |
|
Derezi?ska, A., & Byczkowski, M. (2018, September). Enhancements of Detecting Gang-of-Four Design Patterns in C# Programs. In International Conference on Information Systems Architecture and Technology (pp. 277-286). Springer, Cham. |
|
3 |
|
Rajkumar, A., & Malliga, P. (2016). A fuzzy analytical hierarchy process approach for prioritising the buyers in selling by-product of a sugar plant. International Journal of Logistics Systems and Management, 24(1), 94-112. |
|
4 |
|
Gerdes Jr, J. H., Huang, C. T., & Sharaf, M. A. Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates. Electronic Commerce Research, 1-28. |
|
5 |
|
Sonekar, S. V., & Kshirsagar, M. M. (2016). Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 317-328). Springer India. |
|
6 |
|
Bhosale, D. V., Mitkal, P. K., Pawar, R. N., & Paranjape, R. S. (2016). Review on Computer Forensic. Training, 2(01). |
|
7 |
|
Kumar, D. N. S., & Prabhakar, K. New Image Security Method based on Hill-Cipher. |
|
8 |
|
Muqeem, M. (2016). Design of an Efficient Framework for Requirement Elicitation. |
|
9 |
|
Jaiswal, A., & Malhotra, R. (2016). Software Reliability Prediction Using Machine Learning Techniques. In Proceedings of Fifth International Conference on Soft Computing for Problem Solving (pp. 141-163). Springer Singapore. |
|
10 |
|
Kumar, P., & Wahid, A. (2016). Performance Evaluation of Data Mining Techniques for Predicting Software Reliability. network, 17, 19. |
|
11 |
|
Sritharan, S., & Ragel, V. R. (2016). Identifying the Personality Preference Across Faculties and Demographic Factors: Myers-Briggs Personality Profiles of Academics of Eastern University, Sri Lanka. IUP Journal of Organizational Behavior, 15(2), 56. |
|
12 |
|
Vierto, V. M. (2016). Älykorttipalvelut suomalaisten kuluttajien näkökulmasta. |
|
13 |
|
Racheal, B. O., & Adeosun, O. O. (2016). Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices. |
|
14 |
|
Pukkasenung, P., & Chokngamwong, R. (2016). Review and Comparison of Mobile Payment Protocol. In Advances in Parallel and Distributed Computing and Ubiquitous Services (pp. 11-20). Springer Singapore. |
|
15 |
|
Chakdar, D., Gope, G., Talukdar, A., Avasthi, D. K., & Nath, S. S. (2016). Optical absorption and luminescence study of ZnS quantum dots. une, 13, 15. |
|
16 |
|
Garg, S., Modi, K., & Chaudhary, S. (2016). A QoS-aware Approach for Runtime Discovery, Selection and Composition of Semantic Web Services. International Journal of Web Information Systems, 12(2). |
|
17 |
|
Mohsin, A., Fatima, S., Khan, A. U., & Nawaz, F. (2016). An Automated Approach for Web Services Architectural Style Selection. J Inform Tech Softw Eng, 6(176), 2. |
|
18 |
|
Çakir, H., & Kiliç, M. S. (2016). The keyword search method and its importance in computer forensics Adli bilisimde anahtar kelime aramasi metodu ve önemi. Journal of Human Sciences, 13(1), 2368-2384. |
|
19 |
|
Debnath, D., Deb, S., & Kar, N. (2015, January). An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 178-183). IEEE. |
|
20 |
|
Taherdoost, h., sahibuddin, s., & jalaliyoon, N. How Security Issues Can Influence on Usage of Electronic Services. |
|
21 |
|
Delgado, J. C. (2015). Supporting Enterprise Integration with a Multidimensional Interoperability Framework. International Journal of Social and Organizational Dynamics in IT (IJSODIT), 4(1), 39-70. |
|
22 |
|
Kariuki, P. (2015). Generic process model for android smartphones live memory forensics (doctoral dissertation). |
|
23 |
|
Casmir, R. O. (2015). DETERMINING APPROPRIATE SECURITY PROTECTION FOR ENTERPRISE INFORMATION RESOURCES. Business Education Journal, 1(1). |
|
24 |
|
Padhy, N., Panigrahi, R., & Baboo, S. (2015, January). A Systematic Literature Review of an Object Oriented Metric: Reusability. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 190-191). IEEE. |
|
25 |
|
Dhaya Nor, B. (2015). Comparative analysis of software reusability attributes in web and mobile applications (Doctoral dissertation, Universiti Tun Hussein Onn Malaysia). |
|
26 |
|
RamÃrez Morales, J. (2015). F/OSS para el reuso: métricas, desarrollo de herramientas y marco para su evaluación (Doctoral dissertation, Facultad de Informática). |
|
27 |
|
Makkar, S. R., Williamson, A., Turner, T., Redman, S., & Louviere, J. (2015). Using conjoint analysis to develop a system to score research engagement actions by health decision makers. Health Research Policy and Systems, 13(1), 22. |
|
28 |
|
Aljallabi, B. M., & Mansour, A. (2015, September). Enhancement approach for non-functional requirements analysis in Agile environment. In Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), 2015 International Conference on (pp. 428-433). IEEE. |
|
29 |
|
Ahmad, F. (2015). Copyright Protection for Surveillance System Multimedia Stream with Cellular Automata Watermarking. Control Theory and Informatics, 5(1), 10-15. |
|
30 |
|
Kim, S. (2015). A quantitative and knowledge–based approach to choosing security architectural tactics. International Journal of Ad Hoc and Ubiquitous Computing, 18(1-2), 45-53. |
|
31 |
|
Monteiro, C. (2015). O Scrum como Alternativa ao Modelo em Cascata Aplicado à Zurich Portugal (Doctoral dissertation). |
|
32 |
|
Zill-e-Subhan, A. T. B. Integrated Analysis of Traditional Requirements Engineering Process with Agile Manifesto: A Traditional Solution to Agile Problems. |
|
33 |
|
Adil, A. R. (2015). Text Steganography to Border Image Using Novel Method. Applied Mathematical Sciences, 9(62), 3087-3096. |
|
34 |
|
Huzooree, G., & Ramdoo, V. D. (2015). A Systematic Study on Requirement Engineering Processes and Practices in Mauritius. International Journal, 5(2). |
|
35 |
|
Patil, S., Bhosale, S., & Patil, S. (2015). A Two Fold Approach to Store and Share Secrete Data for Groups in Cloud. IJETT, 2(2). |
|
36 |
|
Vegh, L., & Miclea, L. Improving the Security of a Cyber-Physical System using Cryptography, Steganography and Digital Signatures. |
|
37 |
|
Kalaiselvi, R., & Kavitha, V. (2015). An efficient mechanism for protecting grid from attack using GSOC. International Journal of Enterprise Network Management, 6(4), 312-323. |
|
38 |
|
Naveenkumar, S. K., & Panduranga, H. T. (2015, March). Chaos and Hill Cipher Based Image Encryption for Mammography Images. In Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on (pp. 1-5). IEEE. |
|
39 |
|
Wójtowicz, W. Wykorzystanie technik biometrycznych do tworzenia cyfrowych znaków wodnych. |
|
40 |
|
Selvi, A. K., & Sathik, M. M. (2015). Efficiency Analysis and Security Evaluation of Block based Image Encryption Schemes. Digital Image Processing, 7(1), 29-32. |
|
41 |
|
Sharma, A. K., & Sharma, H. (2015).New approach to des with enhanced key management and encryption/decryption system (des ultimate). International Journal of Advances in Engineering & Technology, 8(3), 368. |
|
42 |
|
Kongnso, F. J. (2015). Best Practices to Minimize Data Security Breaches for Increased Business Performance. |
|
43 |
|
Taherdoost, h., sahibuddin, s., & jalaliyoon, N. E-Service Security; Acceptance Perspective. |
|
44 |
|
Aghajanzadeh, N., & Keshavarz-Haddad, A. (2015). A Concise Model to Evaluate Security of SCADA Systems based on Security Standards. International Journal of Computer Applications, 111(14). |
|
45 |
|
Panduranga, H. T. (2015). Development of image encryption and partial image encryption algorithms. |
|
46 |
|
Patyal, V. S., Modgil, S., & Koilakuntla, M. (2015). Method–comparison studies with Taguchi and response surface methodologies for chemical process optimisation: a case study. International Journal of Quality Engineering and Technology, 5(1), 1-24. |
|
47 |
|
Kumar, L. R., Prakash, P. R., Gopal, G. V., Dharani, D. L., & Rao, B. S. Watermark based Substitution technique Hill Cipher applied on Images. |
|
48 |
|
Jrad, F., Tao, J., Streit, A., Knapper, R., & Flath, C. (2015). A utility–based approach for customised cloud service selection. International Journal of Computational Science and Engineering, 10(1-2), 32-44. |
|
49 |
|
kamenchenko, s. recursive involutory matrix generation algorithm, which is based only with elements±1 and±2. |
|
50 |
|
Darbari, M., Dave, R., & Hemrajani, N. (2015). Building Automation using IOT with Special Reference Regional Variations. International Journal of Computer Applications, 122(7). |
|
51 |
|
Akinola, A. T., Adigun, M. O., & Akingbesote, A. O. (2015, December). QoS-aware single service selection mechanism for ad-hoc mobile cloud computing. In Computing, Communication and Security (ICCCS), 2015 International Conference on (pp. 1-6). IEEE. |
|
52 |
|
Im, H., Park, S. T., & Ko, M. H. (2015). An Empirical Study on a Tradeoff between Security and Convenience: The Case of i-PIN System. Indian Journal of Science and Technology, 8(23). |
|
53 |
|
Chizari, H. Security Issues in ATM Smart Card Technology. |
|
54 |
|
Khowfa, W., Silasai, O., & Kaewpruksapimon, C. (2015). QoS Based Service Selection in Cloud Environment: A Review. International Journal of Advances in Soft Computing & Its Applications, 7(3). |
|
55 |
|
Polska, OV, Polish, OV, Polska, O. V., Kudermetov, RK, Kudermetov, RK, Kudermetov, R. K., ... & Shkarupylo, V. V. (2015). Detection and selection of WEB-services. |
|
56 |
|
Luarsa, S., Marpalo, D., & Sopryadi, H. Penerapan Algoritme Fisher Yates pada Game Edukasi Eco Mania Berbasis Unity 3D. |
|
57 |
|
Chhotaray, S. K., Chhotaray, A., & Rath, G. S. A new method of generating public key matrix and using it for image encryption. |
|
58 |
|
Akhunzada, A., Gani, A., Hussain, S., & Khan, A. A. (2015, November). A formal framework for web service broker to compose QoS measures. In SAI Intelligent Systems Conference (IntelliSys), 2015 (pp. 532-536). IEEE. |
|
59 |
|
Akinola, A. T., Adigun, M. O., Akingbesote, A. O., & Mba, I. N. (2015, September). Optimal service selection in Ad-Hoc mobile market based on multi-dynamic decision algorithms. In Computer Networks and Information Security (WSCNIS), 2015 World Symposium on (pp. 1-6). IEEE. |
|
60 |
|
Dwi Gustia, F., Eric Wibowo, A., Mardiani, M., & Farizi, A. Rancang Bangun Edugame Math Bubbles Untuk Pembelajaran Barisan Aritmatika Berbasis Android. |
|
61 |
|
Elabd, E. (2015). A Dynamic Reputation-Based Approach for Web Services Discovery. |
|
62 |
|
Im, H., & Kim, T. S. (2015). An Empirical Study on Citizen’s Adoption Behavior of Internet Personal Identification Number (i-PIN) System. |
|
63 |
|
Khan, M. H. M. (2015). Representation of Dorsal Hand Vein Pattern Using Local Binary Patterns (LBP). In Codes, Cryptology, and Information Security (pp. 331-341). Springer International Publishing. |
|
64 |
|
Arjunwadkar, M. V. (2015). The knowledge based intrusion detection and prevention model for biometric system. |
|
65 |
|
Supiyanto, S. (2015, December). Implementasi hill cipher pada citra menggunakan koefisien binomial sebagai matriks kunci. In Seminar Nasional Informatika (SEMNASIF) (Vol. 1, No. 1). |
|
66 |
|
Bhardwaj, E., & Kumar, D. Mitigation of Threats using Secure SDLC. |
|
67 |
|
Joshi, A., & Kumari, M. Encryption of RGB image using Arnold transform and involutory matrices. |
|
68 |
|
Rizwan, S. M., Padmavathi, N., & Taneja, G. (2015). Performance analysis of a desalination plant as a single unit with mandatory shutdown during winter. Arya Bhatta Journal of Mathematics and Informatics, 7(1), 195-202. |
|
69 |
|
Kumar, G., & Bhatia, P. K. (2015). Neuro-Fuzzy Model to Estimate & Optimize Quality and Performance of Component Based Software Engineering. ACM SIGSOFT Software Engineering Notes, 40(2), 1-6. |
|
70 |
|
Gobi, M., & Kannan, D. (2015). A Secured Public Key Cryptosystem for Biometric Encryption. International Journal of Computer Science and Network Security (IJCSNS), 15(1), 49. |
|
71 |
|
Mohammed, M. (2014).Evaluating techniques to reduce errors made by novice programmers (Doctoral dissertation, Meliksah University). |
|
72 |
|
Taherdoost, h., sahibuddin, s., & jalaliyoon, n. (2014). Evaluation of Security Factors Effecting on Web-Based Service Adoption. Recent Advances In Telecommunications, Informatics And Educational Technologies, 117-123. |
|
73 |
|
Wiesche, M., & Krcmar, H. (2014, May). The relationship of personality models and development tasks in software engineering. In Proceedings of the 52nd ACM conference on Computers and people research (pp. 149-161). ACM. |
|
74 |
|
Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. Appraisal of Individual Understanding of Social and Ethical Circumstances; Information Technology Utilization. |
|
75 |
|
Partha Sarathi, N. G., & Otto, C. O. (2014, March). Fare management system for transport corporation using face recognition based on principal component analysis. In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on (pp. 1-5). IEEE. |
|
76 |
|
Zhaoming Tao, & Xu Xiaoli. (2014). Quadratic function of longitudinal data to infer semi parametric model estimates. Statistics and Decision, (7), 8-10. |
|
77 |
|
Pattnaik, M. (2014). Optimality test in fuzzy inventory model for restricted budget and space: Move forward to a non-linear programming approach. Yugoslav Journal of Operations Research ISSN: 0354-0243 EISSN: 2334-6043, 25(2). |
|
78 |
|
Zhaoming Tao, & Xu Xiaoli. (2014). Penalty semiparametric longitudinal model of quadratic inference function estimation. Statistics and Information Forum, 29 (8), 3-8. |
|
79 |
|
Sumathi, C. P., Santanam, T., & Umamaheswari, G. (2014). A Study of Various Steganographic Techniques Used for Information Hiding. arXiv preprint arXiv:1401.5561. |
|
80 |
|
South Britain, smell new, & Wang thought. (2014). Situation of human aerospace technology principle and the principle of UFO speculation The Technological Actuality of Human Aerospace Principle and the Possible Fact of UFO. Journal of Aerospace Science and Technology, 2014. |
|
81 |
|
Nan, Y., Wen, X., & Wang, S. (2014). The Technological Actuality of Human Aerospace Principle and the Possible Fact of UFO.International aerospace science, 2, 53-68. |
|
82 |
|
MIET, M. I. Extended Hill Cipher Decryption by Using Transposed Interweaved Shifting. |
|
83 |
|
Koley, S., Pal, K., Ghosh, G., & Bhattacharya, M. (2014). Secure Transmission and Recovery of Embedded Patient Information from Biomedical Images of Different Modalities through a Combination of Cryptography and Watermarking. International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(4), 18. |
|
84 |
|
Jayanthi, V. E. (2014). Design and implementation of vlsi Architecture algorithms for digital Image watermarking. |
|
85 |
|
Velakanti, G., & Katuri, A. (2014). Enhancement of Existing Tools and Techniques for Computer Forensic Investigation. International Journal of Computer Science and Network Security (IJCSNS), 14(12), 74. |
|
86 |
|
Bryant, M. S., & Bryant, R. (Eds.). (2014). Policing Digital Crime. Ashgate Publishing, Ltd.. |
|
87 |
|
Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Muppala, S. The Application of Theory of Constraints in Manufacturing Outsourcing: A Case Study. |
|
88 |
|
Sastry, V. U. K., & Samson, C. A Modern advanced hill cipher including a pair of involutory matrices as multiplicands and involving a set of functions. A= A, 1, 2-1. |
|
89 |
|
Amounas, F., & El Kinani, E. H. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve. |
|
90 |
|
Ogiela, M. R. (2014). New Directions in Cognitive Cryptography. Journal of Convergence Volume, 5(3). |
|
91 |
|
Vegh, L., & Miclea, L. (2014, May). Securing communication in cyber-physical systems using steganography and cryptography. In Communications (COMM), 2014 10th International Conference on (pp. 1-4). IEEE. |
|
92 |
|
Wójtowicz, W., & Ogiela, M. R. (2014). Biometric watermarks based on face recognition methods for authentication of digital images. Security and Communication Networks. |
|
93 |
|
Rajni, M., & Reena, M. (2014). Review of MANETS Using Distributed Public-key Cryptography. arXiv preprint arXiv:1405.0100. |
|
94 |
|
Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática). |
|
95 |
|
Patil, M., Sahu, V., & Jain, A. (2014, January). SMS text Compression and Encryption on Android OS. In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE. |
|
96 |
|
Jonas, M., Solangasenathirajan, S., & Hett, D. (2014). Patient Identification, A Review of the Use of Biometrics in the ICU. In Annual Update in Intensive Care and Emergency Medicine 2014 (pp. 679-688). Springer International Publishing. |
|
97 |
|
Glenn, T., & Monteith, S. (2014). Privacy in the digital world: medical and health data outside of HIPAA protections. Current psychiatry reports, 16(11), 1-11. |
|
98 |
|
Akinsowon, O., Alese, B., & Adewale, O. (2014). Infrared Capture of Palm-Vein Blood Vessel Patterns for Human Authentication. |
|
99 |
|
Selvi, A. K., & Sathik, M. M. (2014). Performance Evaluation of Block based Image Encryption Algorithms. Digital Image Processing, 6(8), 342-345. |
|
100 |
|
AN, R. (2014). An Adaptive Dual Image Encryption: A Review. |
|
101 |
|
Nashwan, S., & Alshammari, B. (2014). Mutual Chain Authentication Protocol for SPAN Transactions in Saudi Arabian Banking. International Journal of Computer and Communication Engineering, 3(5), 326. |
|
102 |
|
Rajni, M., Reena, M., & Reena, M. Nav view search. |
|
103 |
|
Vegh, L., & Miclea, L. (2014, October). A framework for verifying the integrity of the components of a secure cyber-physical system. In System Theory, Control and Computing (ICSTCC), 2014 18th International Conference (pp. 763-768). IEEE. |
|
104 |
|
Vegh, L., & Miclea, L. (2014, May). Enhancing security in cyber-physical systems through cryptographic and steganographic techniques. In Automation, Quality and Testing, Robotics, 2014 IEEE International Conference on (pp. 1-6). IEEE. |
|
105 |
|
SelvaKumar, T. N. D. A. L. (2014). Encryption using lester hill cipher algorithm. |
|
106 |
|
Vegh, L., & Miclea, L. (2014, May). A new approach towards increased security in cyber-physical systems. In Systems, Signals and Image Processing (IWSSIP), 2014 International Conference on (pp. 175-178). IEEE. |
|
107 |
|
Abbas, N. A. (2014). Image watermark detection techniques using quadtrees. Applied Computing and Informatics. |
|
108 |
|
Esan, O. A., Zuva, T., Ngwira, S., & Masupa, L. Mitigating face biometric on electronic medical record. |
|
109 |
|
Sang, J. M. (2014). Mobile Based HIV Patient Identification for Antiretroviral Drugs Dispensing (Doctoral dissertation, Strathmore University). |
|
110 |
|
Tripathy, A., & Kumar, D. Image Steganography By Using Integer Wavelet Transform And Genetic Algorithm To Perform Text Based Hiding Behind Gray Scaled or Colored Image. |
|
111 |
|
Aapaoja, A., & Haapasalo, H. (2014). A framework for stakeholder identification and classification in construction projects. Open Journal of Business and Management, 2014. |
|
112 |
|
Immonen, A., & Pakkala, D. (2014). A survey of methods and approaches for reliable dynamic service compositions. Service Oriented Computing and Applications, 8(2), 129-158. |
|
113 |
|
Saadah, M. N., & Atmagi, R. W. (2014).Quality of service oriented web service selection: an evaluation of techniques. Jurnal Ilmu Komputer dan Informasi, 7(1), 25-30. |
|
114 |
|
Cavalcanti, D. J. M., & Rosa, N. S. O. (2014). Estratégias de Ranqueamento para Seleção Dinâmica de Serviços Baseadas em Atributos de Qualidade. |
|
115 |
|
NWE, N. H. W., BAO, J. M., & Gang, C. U. I. (2014).Flexible user-centric service selection algorithm for Internet of Things services. The Journal of China Universities of Posts and Telecommunications, 21, 64-70. |
|
116 |
|
Maheswari, s., karpagam, g., & manasaa, s.(2014).design of standardization engine for semantic web service selection.Journal of Theoretical and Applied Information Technology, 66(1). |
|
117 |
|
Chakhar, S., Ishizaka, A., & Labib, A. W. (2014). QoS-aware parameterized semantic matchmaking framework for web service composition. |
|
118 |
|
Georgieva, O., & Petrova-Antonova, D. (2014, August). QoS-Aware Web Service Selection Accounting for Uncertain Constraints. In Software Engineering and Advanced Applications (SEAA), 2014 40th EUROMICRO Conference on (pp. 174-177). IEEE. |
|
119 |
|
Lu, W., Hu, X., Wang, S., & Li, X. (2014). A Multi-Criteria QoS-aware Trust Service Composition Algorithm in Cloud Computing Environments. International Journal of Grid and Distributed Computing, 7(1), 77-88. |
|
120 |
|
Nogueira Souza, F., Mota Cavalcanti, D. J., Coutinho Da Silva, T., & Souto Rosa, N. (2014, June). Ranking Strategies for Quality-Aware Service Selection. In Services Computing (SCC), 2014 IEEE International Conference on (pp. 115-122). IEEE. |
|
121 |
|
Petrova-Antonova, D., Hristova, N., & Georgieva, O. (2014, June). RecSS: automation of QoS-aware web service selection. In Proceedings of the 15th International Conference on Computer Systems and Technologies (pp. 256-263). ACM. |
|
122 |
|
Delphin, J. G., & Purushothaman, R. (2014, April). Reputation-enhanced similarity-based dynamic service discovery framework for service-based applications. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE. |
|
123 |
|
Shahzad, A., Musa, S., Irfan, M., & Asadullah, S. (2014). Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement. Journal of Applied Sciences, 14(20), 2487. |
|
124 |
|
Jain, S., & Sheikh, M. (2014). RUCM: A Measurement Model for Detecting the most Suitable Code Component from Object Oriented Repository. International Journal of Computer Applications, 103(2). |
|
125 |
|
Goyal, N., & Gupta, D. (2014). Reusability Calculation of Object Oriented Software Model by Analyzing CK Metric. International Journal of Advanced Research in Computer Engineering & Technology, 3(7), 2466-2470. |
|
126 |
|
Kanwal, F., Bashir, K., & Ali, A. H. (2014). Documentation Practices for Offshore Agile Software Development. Life Science Journal, 11(10s). |
|
127 |
|
Actuators Hu Xiaohui, Wang is still wide, & Li Xiaotao. (2014) based on a combination of global service QoS dynamic random and trust evaluation. Control and Decision, 29 (8), 1379-1386. |
|
128 |
|
Yousefi, A. (2014). Defect Localization using Dynamic Call Tree Mining and Matching and Request Replication: An Alternative to QoS-aware Service Selection. |
|
129 |
|
Massoud, A., & Ramadan, H. (2014). Kravhantering–Brister och lösningar. |
|
130 |
|
Björk, M., Söderström, J., & Ågren, S. (2014). Att möta det okända: Utmaningar vid implementering av ett processorienterat arbetssätt inom offentlig verksamhet. |
|
131 |
|
Bibi, S., Hafeez, Y., Hassan, M. S., Gul, Z., Pervez, H., Ahmed, I., & Mazhar, S. (2014). Requirement Change Management in Global Software Environment Using Cloud Computing. Journal of Software Engineering and Applications, 2014. |
|
132 |
|
Pattnaik, M. (2014). Optimization in fuzzy economic order quantity (FEOQ) model with deteriorating inventory and units lost. LogForum, 3(10), 247-262. |
|
133 |
|
Xia, D., Peng, Z., Tang, Y., & Yang, L. (2014). Research on Standardization of Ground Process Software for Flight Data. In Proceedings of the First Symposium on Aviation Maintenance and Management-Volume II (pp. 309-314). Springer Berlin Heidelberg. |
|
134 |
|
Meland, P. H., Paja, E., Gjære, E. A., Paul, S., Dalpiaz, F., & Giorgini, P. (2014). Threat analysis in goal-oriented security requirements modelling. International Journal of Secure Software Engineering (IJSSE), 5(2), 1-19. |
|
135 |
|
Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multi-agent systems. Artificial Intelligence Review, 42(4), 607-636. |
|
136 |
|
Mallikharjuna, R. K., & Kodali, A. (2014). An Efficient Method for Parameter Estimation of Software Reliability Growth Model Using Artificial Bee Colony Optimization. In Swarm, Evolutionary, and Memetic Computing (pp. 765-776). Springer International Publishing. |
|
137 |
|
Anniprincy, B., & Sridhar, S. Cost Efficient Software Reliability Growth Model Using Gompertz Testing Effort Function. |
|
138 |
|
Princy, B. A., & Sridhar, S. (2014). Measuring Software Reliability and Release Time Using SRGM Tool. International Journal Of Scientific Research And Education, 2(05). |
|
139 |
|
Priyaradhikadevi, T., Parvathi, R. M. S., & Narayanan, K. L. An enhanced stratergy for deriving the quality requirements in qos based web services with location recommender system. |
|
140 |
|
ACTUATORS Hu Xiaohui, Wang is still wide, & Li Xiaotao. (2014). Based on the global dynamic random QoS service composition and trust evaluation. Control and Decision, 29 (8), 1379-1386. |
|
141 |
|
Al-Tarawneh, f. h. a framework for cots software evaluation and selection for cots mismatches handling and non-functional requirements. |
|
142 |
|
Malhotra, S. S. M. Requirement Elicitation Of Large Web Projects. |
|
143 |
|
Bentmar, B., & Shiravand, M. Kravhantering inom landsting. |
|
144 |
|
Elfirdoussi, S., Jarir, Z., & Quafafou, M. (2014).Ranking Web Services using Web Service Popularity Score. International Journal of Information Technology and Web Engineering (IJITWE), 9(2), 78-89. |
|
145 |
|
Chezian, R. M. Big Data Management through polymer Data to accentuate Progression based algorithm. |
|
146 |
|
Vijay, D., & Ganapathy, G. (2014). Guidelines to minimize cost of software quality in agile scrum process. arXiv preprint arXiv:1406.5731. |
|
147 |
|
Xu, Y., & Liang, P. (2014). A Cooperative Coevolution Approach to Automate Pattern-based Software Architectural Synthesis. International Journal of Software Engineering and Knowledge Engineering, 24(10), 1387-1411. |
|
148 |
|
Gupta, R., Agarwal, R., & Goyal, S. A Review of Cyber Security Techniques for Critical Infrastructure Protection. |
|
149 |
|
Xu, Y., & Liang, P. (2014). Automated software architectural synthesis using patterns: A cooperative coevolution approach. In Proc. 26th Int. Conf. on Software Engineering and Knowledge Engineering (pp. 174-180). |
|
150 |
|
Ariffin, M., Afiza, N., & Mohd Sani, N. F. (2014, August). Plan recognition scheme using multi-factors authentication for smart card online system. In Biometrics and Security Technologies (ISBAST), 2014 International Symposium on (pp. 156-160). IEEE. |
|
151 |
|
Shahzad, A., Musa, S., Irfan, M., & Asadullah, S. (2014). Key Encryption Method for SCADA Security Enhancement. Journal of Applied Sciences, 14(20), 2498. |
|
152 |
|
Kumar, G., & Bhatia, P. K. (2014). Automation of software cost estimation using neural network technique. Memory, 1(1.06), 1-21. |
|
153 |
|
Sandhu, G. S., & Salaria, D. S. (2014). A Bayesian Network Model of the Particle Swarm Optimization for Software Effort Estimation. International Journal of Computer Applications, 96(4). |
|
154 |
|
Premnath, A. P., Jo, J. Y., & Kim, Y. (2014, April). Application of NTRU Cryptographic Algorithm for SCADA Security. In Information Technology: New Generations (ITNG), 2014 11th International Conference on (pp. 341-346). IEEE. |
|
155 |
|
Kanwal, F., Bashir, K., & Ali, A. H. (2014). Documentation Practices for Offshore Agile Software Development. Life Science Journal, 11(10s). |
|
156 |
|
Bardsiri, V. K., Jawawi, D. N. A., Hashim, S. Z. M., & Khatibi, E. (2014). A flexible method to estimate the software development effort based on the classification of projects and localization of comparisons. Empirical Software Engineering, 19(4), 857-884. |
|
157 |
|
Sandhu, G. S., & Salaria, D. S. (2014). A Bayesian Network Model of the Particle Swarm Optimization for Software Effort Estimation. International Journal of Computer Applications, 96(4). |
|
158 |
|
Moradi, H., & Moghaddam, H. K. Assessing the Readiness of Civil Registration Bureau of South Khorasan Province to Exploit the Experiences of National Smart ID card Establishment throughout the World. |
|
159 |
|
Taherdoost, H., Sahibuddin, S., Namayandeh, M., & Jalaliyoon, N. (2013, December). Computer and Information Security Ethics--Models. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 145-149). IEEE. |
|
160 |
|
Taherdoost, H., & Hosseinkhani, J. (2013, December). Information Mining on the Web: E-business Application. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 500-503). IEEE. |
|
161 |
|
Taherdoost, H., Sahibuddin, S., Jalaliyoon, N., & Hosseinkhani, J. (2013, December). Classification of Web based Service User Types. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 495-499). IEEE. |
|
162 |
|
Patil, M., & Sahu, V. (2013). A Survey of Compression and Encryption Techniques for SMS. |
|
163 |
|
Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi). |
|
164 |
|
Ramachandran, S., & Lavanya, S. A Cluster based Cost Effective Group Key Management Protocol for Multicast Network. |
|
165 |
|
Meland, P. H., Gjære, E. A., & Paul, S. (2013, September). The Use and Usefulness of Threats in Goal-Oriented Modelling. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on (pp. 428-436). IEEE. |
|
166 |
|
Bhansali, A., HiralBarot, K., Shah, S., & Chheda, V. (2013). Encrypting Watermarked Images: A Transparent Approach. International Journal of Future Computer and Communication, 2(6), 665. |
|
167 |
|
Lamba, S., & Sharma, M. (2013, December). An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA). In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 179-183). IEEE. |
|
168 |
|
WANG, D. (2013). Malicious Node Detection Mechanism for Wireless Ad Hoc Network. International Journal of Security (IJS), 7(1), 1. |
|
169 |
|
Natale, L. P., & Omar, N. (2013, July). Using Ontological Database in Heterogeneous Database Integration. In Proceedings of the International Conference on Computer Education and Engineering (Vol. 8, pp. 292-296). |
|
170 |
|
Puliadi Premnath, A. (2013). Application of NTRU Cryptographic Algorithm for securing SCADA communication. |
|
171 |
|
Preschern, C., Kajtazovic, N., & Kreiner, C. (2013, October). Security analysis of safety patterns. In Proceedings of the 20th Conference on Pattern Languages of Programs (p. 12). The Hillside Group. |
|
172 |
|
Muthusamy, S. K., Thiyagarajan, P., & Selvaraj, L. (2013). An enhanced and cost effective group key management scheme for multicast network. Journal of Computer Science, 9(4), 477. |
|
173 |
|
El-Sayed, A. (2013). Clustering Based Group Key Management for MANET. In Advances in Security of Information and Communication Networks (pp. 11-26). Springer Berlin Heidelberg. |
|
174 |
|
Kumar, S., Purusothaman, N. M., & Lavanya, S. (2013). Design and performance analysis of scalable and efficient group key Management scheme [SEGKMS] for group communication in multicast networks. Life Science Journal, 10(2). |
|
175 |
|
Islam, N., & Shaikh, Z. A. (2013). Security Issues in Mobile Ad Hoc Network. In Wireless Networks and Security (pp. 49-80). Springer Berlin Heidelberg. |
|
176 |
|
Nithya, M., & Varadarajan, V. (2013). An Security Architecture for Campus Virtual Organization Using Role Based Access Control. Life Science Journal, 10(7s). |
|
177 |
|
Manro, R., & Joshi, A. S. (2013).Utilization the power of cloud computing to offer e-governance services through saas model. International Journal of Information Technology & Computer Sciences Perspectives, 2(2), 565. |
|
178 |
|
Akinsowon, O. A., & Alese, B. K. (2013, December). Edge detection methods in palm-print identification. In Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for (pp. 422-426). IEEE. |
|
179 |
|
Munpilju. (2013). Utilization of forensic tools - Antigua for Android smartphones. Korea Electronics and Telecommunications Institute of Science, 8 (6), 855-861. |
|
180 |
|
Staniec, K., & Kowal, M. (2013). A simple method for determining an optimal number of access points in distributed WLAN networks. Elektronika ir Elektrotechnika, 19(9), 101-104. |
|
181 |
|
Shahri, A. B., Ismail, Z., & Rahim, N. Z. A. (2013). Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness. In Advances in Information Systems and Technologies (pp. 213-220). Springer Berlin Heidelberg. |
|
182 |
|
Alam, K. M. R., Mahmud, S., & Khan, M. N. A. (2013). An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications. International Journal of Computer Applications, 66(3). |
|
183 |
|
Fernández-Isabel, A., & Fuentes-Fernández, R. An Integrative Framework for the Model-Driven Development of Traffic Simulations. |
|
184 |
|
ABE, J. O. An investigation of software requirements management practices in nigerian software development industries. |
|
185 |
|
WANG, D. (2013). Malicious Node Detection Mechanism for Wireless Ad Hoc Network. International Journal of Security (IJS), 7(1), 1. |
|
186 |
|
Chávez Estrada, M. J. (2013). Impacto de la implementación de un sistema web en la eficiencia de la administración de la información local de agua y saneamiento de los sectores de la zona rural de la provincia de Cajamarca en la MPC. |
|
187 |
|
Mohammad, A. H., & Alwada'n, T. (2013). Agile Software Methodologies: Strength and Weakness. International Journal of Engineering Science and Technology, 5(3), 455. |
|
188 |
|
Neralla, S., Bhaskari, D. L., & Avadhani, P. S. (2013). Combating against anti-forensics aligned with e-mail forensics. International Journal of Computer Applications, 79(15). |
|
189 |
|
Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. (2013, December). Assessment of Electronic Service Applications Practice: Domains Perspective. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on (pp. 534-537). IEEE. |
|
190 |
|
Shahri, A. B., Ismail, Z., & Rahim, N. Z. A. (2013). Security Culture and Security Awareness as the Basic Factors for Security Effectiveness in Health Information Systems. Jurnal Teknologi, 64(2). |
|
191 |
|
Hashemnejad, R., & Purushothaman, K. Wireless ad hoc networks:malicious nodedetection. |
|
192 |
|
Shah, S., Khan, S. A., & Riaz, N. (2013). Analytical Study of Face Recognition Techniques. |
|
193 |
|
Joseph, A., & Jayasingh, J. R. (2013). Digital Watermarking using Least Significant Bit Insertion Method. Digital Image Processing, 5(2), 76-85. |
|
194 |
|
Kavadia, C. (2013). A Review on Spatial & Transform Domain Digital Watermarking Techniques. International Journal of Advanced Research in Computer Science, 4(3). |
|
195 |
|
Piñol, M., Sappa, A. D., & Toledo, R. (2013, January). Multi-Table Reinforcement Learning for Visual Object Recognition. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 469-479). Springer India. |
|
196 |
|
Rakesh, S. M., Sandeep, G. S. P., Manikantan, K., & Ramachandran, S. (2013, January). DFT-Based Feature Extraction and Intensity Mapped Contrast Enhancement for Enhanced Iris Recognition. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 481-494). Springer India. |
|
197 |
|
Vijay Arputharaj, J., & Chezian, R. M. (2013). Data Mining through DNA Database to Enhance Gene Bases Algorithm. |
|
198 |
|
Muhammad, J. (2013). Exploring the automatic identi?cation and resolution of software vulnerabilities in grid-based environments (Doctoral dissertation, University of Glasgow). |
|
199 |
|
Sakthivel, A., & Nedunchezhian, R. (2013). Improved the execution speed of ecdsa over gf (2 n) algorithm for concurrent computation. Journal of Theoretical & Applied Information Technology,50(1). |
|
200 |
|
Al-Khouri, A. M. (2013). Triggering the Smart Card Readers Supply Chain. |
|
201 |
|
Staniec, K., & Kowal, M. (2013). A simple method for determining an optimal number of access points in distributed WLAN networks. Elektronika ir Elektrotechnika, 19(9), 101-104. |
|
202 |
|
Rao, S., Hari, C. H., & Prasad Reddy, P. V. G. D. (2013). Predictive and Stochastic Approach for Software Effort Estimation. Int. J. of Software Engineering, IJSE, 6. |
|
203 |
|
Bandara, K. Y., Wang, M., & Pahl, C. (2013). An extended ontology-based context model and manipulation calculus for dynamic Web service processes. Service Oriented Computing and Applications, 9(2), 87-106. |
|
204 |
|
Kacprzyk, J. Studies in Computational Intelligence 468. |
|
205 |
|
Zhaoming Tao, & Xiao group. (2013). Longitudinal data non-punitive model parameters correction quadratic inference function estimation. Mathematics in Practice and Theory, 5, 031. |
|
206 |
|
Baykal, N. (2013).Use of project similarity for software development time estimation (Doctoral dissertation, MIDDLE EAST TECHNICAL UNIVERSITY). |
|
207 |
|
Mahalakshmi, K., & Prabhakar, R. (2013). Performance Evaluation of Non Functional Requirements. Global Journal of Computer Science and Technology, 13(8). |
|
208 |
|
Kaur, G., & Malhotra, S. A Hybrid Approach for Data Hiding using Cryptography Schemes. |
|
209 |
|
Kumar, P., & Singh, Y. (2013). Comparative analysis of software reliability predictions using statistical and machine learning methods. International Journal of Intelligent Systems Technologies and Applications, 12(3-4), 230-253. |
|
210 |
|
Varona, D., Capretz, L. F., & Raza, A. A multicultural comparison of software engineers. |
|
211 |
|
Zeaaraoui, A., Bougroun, Z., Belkasmi, M. G., & Bouchentouf, T. (2013, August). User stories template for object-oriented applications. In Innovative Computing Technology (INTECH), 2013 Third International Conference on (pp. 407-410). IEEE. |
|
212 |
|
Hofreiter, B., & Marchand-Maillet, S. (2013, December). Rank Aggregation for QoS-Aware Web Service Selection and Composition. In Service-Oriented Computing and Applications (SOCA), 2013 IEEE 6th International Conference on (pp. 252-259). IEEE. |
|
213 |
|
Ajao, T. A., Deris, S., & Obasa, I. A. (2013). QoS-based Web Service Selection Using Filtering, Ranking and Selection Algorithm. International Journal of Scientific & Engineering Research, 4(7). |
|
214 |
|
Ajao, T. A., & Deris, S. (2013). Optimal web service selection with consideration for user’s preferences. IJCSI) Internat Journ Comput Sci Issu. |
|
215 |
|
Nandeesh, G. S., Vijaya, P. A., & Sathyanarayana, M. V. (2013). An Image Encryption using Bit level permutation and dependent diffusion. International Journal of Computer Science and Mobile Computing, 2(5), 145-154. |
|
216 |
|
Naveenkumar, S. K., & Panduranga, H. T. (2013, July). Partial image encryption for smart camera. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 126-132). IEEE. |
|
217 |
|
Emmanuel, W. S., & Singh, C. E. J. (2013).Digital color image encryption based on invertible matrix with secret sharing. ICTACT J. Image and Video Procss, 3(3), 572-576. |
|
218 |
|
Samson, C., & Sastry, V. U. K. (2013). Encryption of a Gray level Image and a Color Image by Using a Key Bunch Matrix. nternational Journal of Advanced Computing, ISSN, 2051-0845. |
|
219 |
|
Soyjaudah, K. S., & KA, S. D. (2013). Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method. International Journal of Computer Applications, 63(21). |
|
220 |
|
Chhotaray, S. K., Majhi, J., & Rath, G. S. (2013). Encryption by Hill cipher and by a novel method using Chinese remainder theorem in Galois field. International Journal of Signal and Imaging Systems Engineering, 6(1), 38-45. |
|
221 |
|
Pattnaik, M. (2013). A note on profit-maximization fuzzy EOQ models for deteriorating items with two dimensional sensitive demand. International Journal of Management Science and Engineering Management, 8(4), 229-240. |
|
222 |
|
Yassin Kassab, R. (2013). A methodology for automated service level agreement compliance prediction. |
|
223 |
|
Sathya, M., Dhavachelvan, P., & Vivekanandan, K. (2013). Egalitarian Based Negotiation Model for QoS Based Web Service Selection. International Journal of Engineering and Technology, 8(2), 134-142. |
|
224 |
|
Diaz, V. A. P. (2013). Detecção de Violações de SLA em Coreografias de Serviços Web (Doctoral dissertation, Universidade de São Paulo). |
|
225 |
|
Siegemund, K. (2013). Contributions To Ontology-Driven Requirements Engineering. |
|
226 |
|
Souza, C., Souza, C., Alencar, F. M., Castro, J., Figueiredo, E., & Cavalcanti, P. (2013). Avaliação de Modelos i* com o Processo AIRDoc-i. In ER@ BR. |
|
227 |
|
Castro, J., & Alencar, F. (2013). Uso de Modelagem Social na Engenharia de Requisitos. Jornada de Atualização de Informática-JAI. |
|
228 |
|
ManiRoja, M., & Sawarkar, S. (2013). Biometric Database Protection using Public Key Cryptography. International Journal of Computer Science and Network Security (IJCSNS), 13(5), 20. |
|
229 |
|
Roja, M. M., & Sawarkar, S. (2013). ElGamel Encryption for Biometric Database Protection. International Journal of Computer Applications, 68(6). |
|
230 |
|
Rahmes, M., Wilder, K., & Fox, K. (2013, May). A multi-resolution fractal additive scheme for blind watermarking of 3D point data. In SPIE Defense, Security, and Sensing (pp. 87570G-87570G). International Society for Optics and Photonics. |
|
231 |
|
Barkathunisha, S., & Meenakumari, R. (2013, April). Secure transmission of medical information using IRIS recognition and steganography. In Computation of Power, Energy, Information and Communication (ICCPEIC), 2013 International Conference on (pp. 89-92). IEEE.Pawar, A., Kumbhare, T., & Murkute, P. Enhancing Iris Scanning Using Visual Cryptography. |
|
232 |
|
Kamal, S., & Nasir, J. A. (2013). A Fuzzy Logic Based Software Cost Estimation Model. International Journal of Software Engineering and Its Applications, 7(2), 7-18. |
|
233 |
|
Bardsiri, V. K., Jawawi, D. N. A., Hashim, S. Z. M., & Khatibi, E. (2013). A PSO-based model to increase the accuracy of software development effort estimation. Software Quality Journal, 21(3), 501-526. |
|
234 |
|
Pillai, A. S. (2013, December). A study on the software requirements elicitation issues-its causes and effects. In Information and Communication Technologies (WICT), 2013 Third World Congress on (pp. 245-252). IEEE. |
|
235 |
|
Hagal, M., & Alshareef, S. F. (2013, December). A systematic approach to generate and clarify consistent requirements. In IT Convergence and Security (ICITCS), 2013 International Conference on (pp. 1-4). IEEE. |
|
236 |
|
Oliveira, K., Pimentel, J., Santos, E., Dermeval, D., Guedes, G., Souza, C., ... & Silva, C. (2013). 25 years of Requirements Engineering in Brazil: a systematic mapping. In Workshop on Requirements Engineering. |
|
237 |
|
Schneider, L., Hajji, K., Schirbaum, A., & Basten, D. (2013). Knowledge Creation in Requirements Engineering-A Systematic Literature Review. In Wirtschaftsinformatik (p. 114). |
|
238 |
|
Ganesh, M. S., & Thanushkodi, K. (2013). FAHSCEP: Fuzzy and Analogy Based Hybrid Software Cost Estimation Process. International Review on Computers and Software (IRECOS), 8(7), 1497-1505. |
|
239 |
|
da Silva, C. E., & Ferreira, L. A Comparative Analysis of Multicriteria Approaches for Cloud Services Selection Hivana Alice Medeiros de Macedo Departamento de Informática e Matemática Aplicada–Universidade Federal do Rio Grande do Norte Caixa Postal 1524–Campus Universitário–59078-900–Natal/RN–Brasil. |
|
240 |
|
FSKSM, U. T. M. A Fuzzy Logic Based Software Cost Estimation Model. |
|
241 |
|
Latif, M. S., Sarwar, M. U., Talib, M. R., Khan, M. I., & Sarwar, M. B. (2013). Improvement in software quality with prioritization requirements. International Journal of Computer Science and Management Research, 2(4), 2171-2183. |
|
242 |
|
Kuznetsova, Yu, Syromyatnikov, A., & Turkin, IB (2013). Practical analysis of the internal quality of the software open source. Sistemi obrobki Informácie, (6), 224-233. |
|
243 |
|
ARSHAD, S., MUHAMMAD, S., & SHAHZAD, S. (2013). Empirical analysis of traditional and agile requirement engineering process. Science Technology and Development (Pakistan). |
|
244 |
|
Abbasi, W. A. (2013).Fuzzy logic based intelligent software requirement elicitation technique selection model (Doctoral dissertation, Iqra University Islamabad). |
|
245 |
|
Chugh, N., & Mishra, A. D. (2013). Assimilation of Four Layered Approach to NFR in Agile Requirement Engineering. International Journal of Computer Applications, 78(5), 25-28. |
|
246 |
|
Moo-Mena, F. J., Uc-Cetina, V. M., & Canton-Puerto, D. G. (2012, September). Dynamic web services selection using a hidden Markov model. In Electrical Engineering, Computing Science and Automatic Control (CCE), 2012 9th International Conference on (pp. 1-6). IEEE. |
|
247 |
|
Du, Y., Wang, X., Ai, L., & Li, X. (2012, September). Dynamic selection of services under temporal constraints in cloud computing. In e-Business Engineering (ICEBE), 2012 IEEE Ninth International Conference on (pp. 252-259). IEEE. |
|
248 |
|
Asthana, R., Ahuja, N. J., Darbari, M., & Shukla, P. K. (2012). A Critical Review on the Development of Urban Traffic Models & Control Systems. Int. J. Sci. Eng. Res, 3(1), 1-6. |
|
249 |
|
Tripathy, P. K., Pattnaik, M., & Tripathy, P. (2012). The finite horizon trended continuous inventory replenishment and pricing problems for deteriorating items with stock and price sensitive demand. Investigaciones Operacionales, 33(1), 1-12. |
|
250 |
|
Pattnaik, M. Variable Ordering Cost, Promotional Effort Cost and Units Lost due to Deterioration in Fuzzy Economic Order Quantity (FEOQ) Model. |
|
251 |
|
Uikey, N., & Suman, U. (2012, September). An empirical study to design an effective agile project management framework. In Proceedings of the CUBE International Information Technology Conference (pp. 385-390).acm. |
|
252 |
|
Batista, C., Alves, G., Cavalcante, E., Lopes, F., & Batista, T. (2012). Monitoramento de metadados para Computação Ubíqua. In XXXIX Seminário Integrado de Software e Hardware (SEMISH 2012), Curitiba, PR, Brasil. Anais do XXXII Congresso da Sociedade Brasileira de Computação (CSBC 2012). Porto Alegre, RS, Brasil: SBC. |
|
253 |
|
Varela, D. T. (2012).How to avoid the n-1 attack without costly implementations. International Journal of Network Security & Its Applications, 4(4), 109. |
|
254 |
|
PVGD, P. R., & VMK, H. C. (2012). Fuzzy and Swarm Intelligence for Software Cost Estimation. Global Journal of Computer Science and Technology, 11(22). |
|
255 |
|
Divya, D., & Chugh, A. (2012). Honeymaze: a hybrid intrusion detection system. International Journal of Advances in Engineering & Technology, 4(1). |
|
256 |
|
Devi, S., & Arockiam, L. (2012). Simulated Annealing based Service Selection Algorithm for Composite Web Services. International Journal of Advanced Research in Computer Science, 3(2). |
|
257 |
|
Vadgama, V., Tanti, B., Modi, C., & Doshi, N. (2012). A novel approach for e-payment using virtual password system. arXiv preprint arXiv:1208.3859. |
|
258 |
|
Shahri, A. B., Ismail, Z., & Rahim, N. Z. Cultivating of Human’s Behavior Toward Security Effectiveness in Health Information System. |
|
259 |
|
Pattnaik, M. (2012). Effect of deteriorating items and promotional effort factor in fuzzy instantaneous replenishment model. International Journal of Management Science and Engineering Management, 7(4), 303-311. |
|
260 |
|
Tripathy, P. K., Pattnaik, M., & Tripathy, P. (2012). Optimal Promotion and Replenishment Policies for Profit Maximization Model under Lost Units. American Journal of Operations Research, 2(02), 260. |
|
261 |
|
Pro, S. F., & Call, F. I. (2012). Secure and Trustworthy Composite S. |
|
262 |
|
Uzunov, A. V., Fernandez, E. B., & Falkner, K. (2012). Engineering Security into Distributed Systems: A Survey of Methodologies. J. UCS, 18(20), 2920-3006. |
|
263 |
|
Tenorio, Á. F., Gaballah, M. S., & Ferreira, M. A. M. (2012). Technical editor A. Xankishiyev. |
|
264 |
|
Andrade, M., & Ferreira, M. A. M. (2012). Crime scene investigation with Bayesian probabilistic expert systems. Applied Mathematics, 2(2), 7-10. |
|
265 |
|
Andrade, M., & Ferreira, M. A. M. (2012). THE PROBLEM OF CIVIL AND CRIMINAL IDENTIFICATION-BAYESIAN NETWORKS APPROACH. Technical editor A. Xankishiyev, 103. |
|
266 |
|
Andrade, M., & Ferreira, M. A. M. (2012). Civil and criminal identification with Bayesian networks. |
|
267 |
|
Kumar, P., & Singh, Y. (2012). Assessment of software testing time using soft computing techniques.Acm Sigsoft Software Engineering Notes, 37(1), 1-6. |
|
268 |
|
Kumar, P., & Singh, Y. (2012). An empirical study of software reliability prediction using machine learning techniques. International Journal of System Assurance Engineering and Management, 3(3), 194-208. |
|
269 |
|
Atmagi, R. W., & Saadah, M. N. (2012).Quality of service based web service selection: an evaluation of techniques. juti: jurnal ilmiah teknologi informasi, 10(2), 61-65. |
|
270 |
|
Taherdoost, H., Sahibuddin, S., Namayandeh, M., Jalaliyoon, N., Kalantari, A., & Chaeikar, S. S. (2012). Smart Card Adoption Model: Social and Ethical Perspectives. Science, 3(4). |
|
271 |
|
Taherdoost, H., Sahibuddin, S., Ibrahim, S., Kalantari, A., & Jalaliyoon, N. (2012). Classification of Internet Products and Evaluation of Application Utilization Based on the Product Fulfillment Process. In 3rd European Conference of Computer Science. |
|
272 |
|
Batista, C., Alves, G., Cavalcante, E., Lopes, F., Batista, T., Delicato, F. C., & Pires, P. F. (2012). A metadata monitoring system for Ubiquitous Computing. In Proc. of the 6th Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies (pp. 60-66). |
|
273 |
|
Ridhawi, Y. A., Ridhawi, I. A., Samaan, N., & Karmouch, A. (2012, July). An Adaptive Vertical Handover in Service Specific Overlay Networks. In Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on (pp. 418-423). IEEE. |
|
274 |
|
Copeland, R., & Crespi, N. (2012, July). Establishing enterprise Business Context (eBC) for service policy decision in mobile broadband networks. In Computer Communications and Networks (ICCCN), 2012 21st International Conference on (pp. 1-5). IEEE. |
|
275 |
|
Papatheocharous, E., & Andreou, A. S. (2012).A hybrid software cost estimation approach utilizing decision trees and fuzzy logic. International Journal of Software Engineering and Knowledge Engineering, 22(03), 435-465. |
|
276 |
|
Kingsley, L., & Worker, M. The implementation of an intelligent digital rights management platform in the health care field. |
|
277 |
|
Shami, F., Shamsafar, F., & Seyedarabi, H. (2012). Securing Database of Biometric Systems. Database, 7, 6. |
|
278 |
|
Distanont, A., Haapasalo, H., Vaananen, M., & Lehto, J. (2012). The engagement between knowledge transfer and requirements engineering. International Journal of Management, Knowledge and Learning, 1(2), 131-156. |
|
279 |
|
Al-Fataftah, I. A., & Issa, A. A. (2012). A systematic review for the latest development in requirement engineering. World Acad Sci Eng Technol, 6, 691-698. |
|
280 |
|
Christopher, D. F. X., & Chandra, E. (2012).Prediction of software requirements stability based on complexity point measurement using multi-criteria fuzzy approach. International Journal of Software Engineering & Applications, 3(6), 101. |
|
281 |
|
Lehto, J., Haapasalo, H., Distanont, A., & Vaananen, M. (2012). The Engagement between Knowledge Transfer and Requirements Engineering. International Journal of Management, Knowledge and Learning, (2), 131-156. |
|
282 |
|
Rajagopal, R., & Chitra, M. (2012, July). Trust based interoperability security protocol for grid and Cloud computing. In Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on (pp. 1-5). IEEE. |
|
283 |
|
Collaborative, i. ctechnica. |
|
284 |
|
Ramingwong, L. (2012). A review of requirements Engineering processes, Problems and models. International Journal of Engineering Science and Technology, 4(6). |
|
285 |
|
Hussein, J. A. (2012). Luminance-based embedding approach for color image watermarking. International Journal of Image, Graphics and Signal Processing (IJIGSP), 4(3), 49. |
|
286 |
|
Sinduja, R., Sathiya, R. D., & Vaithiyanathan, V. (2012, March). Sheltered iris attestation by means of Visual Cryptography (SIA-VC). In Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on (pp. 650-655). IEEE. |
|
287 |
|
Dewangan, S., Pandey, M. S., & Khan, M. I. Design of a Cryptosystem Using Two-Level Hill Cipher. |
|
288 |
|
Gadiparthi, M., Paladugu, R., Paladugu, S., & Vejendla, M. A Fuzzy QOS Key Base Secured MANET Routing with Multipath Data Fragmentation (FQKSMR). |
|
289 |
|
Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm. |
|
290 |
|
Diwakar, M., & Sharma, P. Fingerprint Template Protection using Steganography. |
|
291 |
|
Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT. |
|
292 |
|
KITM, K., & HCTM, K. Secure Personal Recognition System based on Hashes Keys. |
|
293 |
|
Dalal, R., Singh, Y., & Khari, M. (2012). A review on key management schemes in MANET. International Journal of Distributed and Parallel Systems, 3(4), 165. |
|
294 |
|
Azeez, A., & Preetha, K. G. (2012, October). A novel approach for dynamic leader election and key based security in MANET clusters for the secured data distribution. In Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology (pp. 52-56). ACM. |
|
295 |
|
Kumar, N. S., & Purusothaman, T. (2012). SEGKMS: Scalable and Efficient Group Key Management Scheme in Multicast Networks. European Journal of Scientific Research, 89(3), 394-408. |
|
296 |
|
Kushwah, V. S., & Sharma, G. (1985). Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network. International Journal of Computer Science and Security, 4(6), 551. |
|
297 |
|
Chitla, A., & Mohan, M. C. (2012). Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications, 57(6). |
|
298 |
|
Kaur, R. (2012). Developing a Benchmark Model for Image Digital Watermarking. In International Journal of Applied Information Systems (IJAIS)–ISSN: 2249-0868 Foundation of Computer Science FCS. |
|
299 |
|
Chhotaray, S. K. (2012). Asymmetric Image Encryption based on Cipher Matrices. |
|
300 |
|
Panduranga, H. T. (2012). Hybrid Approach for Image Encryption Using Hill Cipher Technique. In Wireless Networks and Computational Intelligence (pp. 200-205). Springer Berlin Heidelberg. |
|
301 |
|
Selvi, A. K., & Sathik, M. M. (2012). Secret Sharing Scheme for Image Encryption Based on Primitive Root Theorem. International Journal of Control and Automation, 5(3), 37-46. |
|
302 |
|
Panduranga, H. T. (2012). Encryption approach for images using bits rotation reversal and extended hill cipher techniques. International journal of computer applications, 59(16). |
|
303 |
|
Panduranga, H. T., & Kumar, S. N. (2012). Advanced partial image encryption using two-stage hill cipher technique. International Journal of Computer Applications (0975-8887), 60(16). |
|
304 |
|
Dey, S. (2012, June). SD-EI: A cryptographic technique to encrypt images. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 28-32). IEEE. |
|
305 |
|
Heenaye, M., & Khan, M. (2012). A multimodal hand vein biometric based on score level fusion. Procedia Engineering, 41, 897-903. |
|
306 |
|
Gandhi, P., & Bhatia, P. K. (2012). Analytical analysis of generic reusability: Weyuker’s Properties. International Journal of Computer Science Issues, 9(2), 424-427. |
|
307 |
|
Dey, S. (2012, July). SD-AEI: An advanced encryption technique for images. In Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on (pp. 68-73). IEEE. |
|
308 |
|
Fakhfakh, N. (2012). Une approche orientée utilisateur pour la supervision des orchestrations de services (Doctoral dissertation, Université de Grenoble). |
|
309 |
|
Mobarhan, M. A., Mobarhan, M. A., & Shahbahrami, A. (2012). Evaluation of security attacks on UMTS authentication mechanism. International Journal of Network Security & Its Applications, 4(4), 37-52. |
|
310 |
|
Mobarhan, M. A., Mobarhan, M. A., & Shahbahrami, A. Evaluation of Security Attacks on Different Mobile Communication Systems. |
|
311 |
|
Panduranga, H. T., Sharath Kumar, H. S., & Naveen Kumar, S. K. (2012, December). Hybrid approach for dual image encryption using nibble exchange and Hill-cipher. In Machine Vision and Image Processing (MVIP), 2012 International Conference on (pp. 101-104). IEEE. |
|
312 |
|
Arockiam, L., & Sasikaladevi, N. (2012). Simulated Annealing Based Service Selection Algorithm for Composite Web Service. International Journal of Advanced Research in Computer Science, 3(2). |
|
313 |
|
Kaur, R. Article: Developing a Benchmark Model for Image Digital Watermarking}. International Journal of Applied, 3, 30-34. |
|
314 |
|
Petrova-Antonova, D., & Dimov, A. (2012). Towards a taxonomy of Web service composition approaches. Scalable Computing: Practice and Experience, 12(4). |
|
315 |
|
Sekar, K., Ravichandran, K., & SINGH, A. (2012).Enhancement of software component compatibility in enterprise software development using high peer and low peer. journal of theoretical and applied information technology, 46(1). |
|
316 |
|
Qwaider, W. Q. (2012). Empirical Study of the Evolution of Agile-developed Software System in Jordanian's Telecom. International Journal of Business Information Systems, 1(1). |
|
317 |
|
Liao, C. F., Cheng, H. H., & Fu, L. C. (2011, December). Unifiable Preference Expressions for Pervasive Service Composition. In Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific (pp. 424-431). IEEE. |
|
318 |
|
May, M., & George, S. (2011, May). Using students tracking data in E-learning: Are we always aware of security and privacy concerns?. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (pp. 10-14). IEEE. |
|
319 |
|
Yousefi, A., & Down, D. G. (2011, December). Request Replication: An alternative to QoS aware service selection. In Service-Oriented Computing and Applications (SOCA), 2011 IEEE International Conference on (pp. 1-4). IEEE. |
|
320 |
|
Devarakonda, r. (2011). a service oriented web-based system for finding and retrieving geological data. in 2011 gsa Annual Meeting in Minneapolis. |
|
321 |
|
Abbaci, K., Lemos, F., Hadjali, A., Grigori, D., Liétard, L., Rocacher, D., & Bouzeghoub, M. (2011, September). An approach based on fuzzy sets to selecting and ranking business processes. In Commerce and Enterprise Computing (CEC), 2011 IEEE 13th Conference on (pp. 213-218). IEEE. |
|
322 |
|
Abbaci, K., Lemos, F., Hadjali, A., Grigori, D., Liétard, L., Rocacher, D., & Bouzeghoub, M. (2011). Selecting and ranking business processes with preferences: an approach based on fuzzy sets. In On the Move to Meaningful Internet Systems: OTM 2011 (pp. 38-55). Springer Berlin Heidelberg. |
|
323 |
|
Andrade, M., Ferreira, M. A. M., & UNIDE-IUL, L. P. (2011). FORENSIC IDENTIFICATION WITH BAYES’LAW. Ángel F. Tenorio, Prof. Dr., 206. |
|
324 |
|
Andrade, M., & Ferreira, M. A. M. (2011). Crime scene investigation with probabilistic expert systems. International Journal of Academic Research, 3(3 Part I), 7-15. |
|
325 |
|
Saleh, M. F. (2011). An Agile Software Development Framework. International Journal on Software Engineering (IJSE), 2(5). |
|
326 |
|
Zakaria, N. H., Haron, A., Sahibuddin, S., & Harun, M. (2011). Requirement engineering critical issues in public sector software project success factor. International Journal of Information and Electronics Engineering, 1(3), 200-209. |
|
327 |
|
Rani, A., Solanki, K., & Jangra, G. (2011). Requirement Engineering: A Comprehensive Review. Software Engineering and Technology, 3(6), 275-280. |
|
328 |
|
Gill, N. S., & Sikka, S. (2011). Inheritance Hierarchy Based Reuse & Reusability Metrics in OOSD. International Journal on Computer Science and Engineering, 3(6), 2300-2309. |
|
329 |
|
Gaballah, M. S., Ferreira, M. A. M., & Axinte, E. (2011). Ángel F. Tenorio, Prof. Dr. |
|
330 |
|
Andrade, M., & Ferreira, M. A. M. (2011). Paternities Search in a very uncommon situation through object-oriented Bayesian networks. Journal of Mathematics and Technology. |
|
331 |
|
Kolli, M. K., & Arimanda, S. R. (2011). Performance study of security mechanism for mobile agent domain. |
|
332 |
|
Sathik, M. M. (2011). Polynomial based secret sharing scheme for image encryption based on mathematical theorem. International Journal of Advanced Research in Computer Science, 2(1). |
|
333 |
|
May, M., & Sébastien, G. (2011).Privacy Concerns in E-learning: Is Using Tracking System a Thread. International Journal of Information and Education Technology, 1(1), 1-8. |
|
334 |
|
Pal, O., Saxena, A., Kumawat, U., Batra, R., & Saquib, Z. (2011). Secure Group Deffie-Hellman Key Exchange with ID Based Cryptography. In Computer Networks and Information Technologies (pp. 498-503). Springer Berlin Heidelberg. |
|
335 |
|
Ferraz, L. H. G. (2011). Um mecanismo de exclusao acurado e preciso baseado em confiança para controle de acesso em redes ad hoc (Doctoral dissertation, Universidade Federal do Rio de Janeiro). |
|
336 |
|
Gadiparthi, M., Vejendla, M., Paladugu, R., & Rao, P. N. (2011). A Unique Light Weight Time Stamp Based Distributed Security Protocol for Wireless Ad hoc Network. Wireless Communication, 3(2), 95-102. |
|
337 |
|
Tripathy, P. K., Pattnaik, M., & Tripathy, P. Acerca de los autores/as. |
|
338 |
|
Pattnaik, M. (2011). A note on non linear optimal inventory policy involving instant deterioration of perishable items with price discounts. The Journal of Mathematics and Computer Science, 3(2), 145-155. |
|
339 |
|
Pattnaik, M. The Journal of Mathematics and Computer Science. |
|
340 |
|
Pattnaik, M. Paper Infomation. |
|
341 |
|
Ling, A. P. A., & Masao, M. (2011). Grid Information Security Functional Requirement-Fulfilling Information Security of a Smart Grid System. arXiv preprint arXiv:1108.0267. |
|
342 |
|
Khan, N. M., & Khan, N. M. (2011, December). Dorsal hand vein biometric using Independent Component Analysis (ICA). In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 191-195). IEEE. |
|
343 |
|
Senekane, M., Qhobosheane, S., & Taele, B. M. (2011). Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze. IJCSNS, 11(6), 30. |
|
344 |
|
Acharya, B., Thomas, N., Arasu, D. R., & Prasad, N. V. (2011, February). Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. In Proceedings of the 2011 International Conference on Communication, Computing & Security (pp. 606-609). ACM. |
|
345 |
|
Shanmugam, P., & Loganathan, C. (2011). Involutory Matrix In Visual Cryptography. a a, 22, 21. |
|
346 |
|
Joardar, H., Das, N. S., & Sutradhar, G. (2011). An experimental study of effect of process parameters in turning of LM6/SiC P metal matrix composite and its prediction using response surface methodology. International Journal of Engineering, Science and Technology, 3(8), 132-141. |
|
347 |
|
saboktakin Rizi, E., & Reshadinezhad, M. Comparing the Impact of Bandwidth and Congestion on Selection of Heterogeneous Lines Applying Fuzzy-Genetic. |
|
348 |
|
Paunwala, M. C., & Patnaik, S. (2011). Biometric Template Protection With Robust Semi–Blind Watermarking Using Image Intrinsic Local Property. International Journal of Biometrics and Bioinformatics (IJBB), 5(2), 28. |
|
349 |
|
PVGDP, R., CHVMK, H., & Rao, T. S. (2011). Multi objective particle swarm optimization for software cost estimation. Int J Comput Appl, 32(3), 13-17. |
|
350 |
|
Bawa, S. (2010). Interoperability: Bridging the Gap. International Journal of Computer Applications, 7(12). |
|
351 |
|
Vellanki, U. S., Varanasi, A., & Kumar, S. U. (2010). Advanced Hill Cipher Handling the Entire Plaintext as a Single Block. International Journal of Advanced Research in Computer Science, 1(4). |
|
352 |
|
Sathik, M. M., & Selvi, A. K. (2010). An Image Encryption Decryption Method Using Secret Based Transformation Matrix. Digital Image Processing, 2(10), 401-404. |
|
353 |
|
Dey, S. C., Das, R., Nath, S. S., & Bhattacherjee, R. (2010). Photo-luminescence of CdSe quantum dots suspended in liquid paraffin. OPTOELECTRONICS AND ADVANCED MATERIALS-RAPID COMMUNICATIONS, 4(11), 1721-1723. |
|
354 |
|
Bhanwar, S., & Bawa, S. (2010). TUX-INTERO: A Portal for secure interoperation of Grids. Int. J. Eng. Sci. Technol, 2, 3335-3343. |
|
355 |
|
Acharya, B., Sharma, M. D., Tiwari, S., & Minz, V. K. (2010). Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem. Procedia Computer Science, 2, 242-247. |
|
356 |
|
Revenkar, P. S., Anjum, A., & Gandhare, W. Z. (2010). Secure iris authentication using visual cryptography. arXiv preprint arXiv:1004.1748. |
|
357 |
|
Selvi, A. K., & Sathik, D. M. M. (2010). Multimedia Security Using Secret Sharing Scheme for Image Encryption. International Journal of Computer AND Internet Security, 57-66. |
|
358 |
|
Dey, S. C., Das, R., Nath, S. S., & Bhattacherjee, R. (2010). Fluorescence study of CdSe quantum dots suspended in liquid paraffin. Nano, 5(06), 357-359. |
|
359 |
|
Tapaswi, S., & Kushwah, V. S. (2010, June). Securing Nodes in MANETs Using Node Based Key Management Scheme. In Advances in Computer Engineering (ACE), 2010 International Conference on (pp. 228-231). IEEE. |
|
360 |
|
Varghese, J. (2010). Image Encryption and Compression using Embedding Technique (Doctoral dissertation, Christ University). |
|
361 |
|
Khoury, I., & Caushaj, E.computer forensic. |
|
362 |
|
Prasad, A., Chaurasia, S., Singh, A., & Gour, D. (2010). Mapping Cloud computing onto useful E-Governance. International Journal of Computer Science, 8(5). |
|
363 |
|
Kane, A. M. (2010).On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148. |
|
364 |
|
Kathuria, M. (2010). Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography. International Journal of Computer Applications, 12(8), 1-5. |
|
365 |
|
Xie, Q., Wu, K., Xu, J., He, P., & Chen, M. (2010). Personalized context-aware QoS prediction for web services based on collaborative filtering. In Advanced Data Mining and Applications (pp. 368-375). Springer Berlin Heidelberg. |
|
366 |
|
Nuric, A., Nuric, S., Kricak, L., & Negovanovic, M. (2010). Developing and Application of Software for Determining Parameters of Drainage on Designed Embankment. Mining magazine, 201(1/2). |
|
367 |
|
Bhanwar, S., & Bawa, S. (2010). Reputation Enhancement in a Trust Management System. In Recent Trends in Network Security and Applications (pp. 440-451). Springer Berlin Heidelberg. |
|
368 |
|
Andrade, M., & Ferreira, M. A. M. (2010). Solving civil identification cases with DNA profiles databases using Bayesian networks. Journal of Mathematics and Technology, 1(2), 37-40. |
|
369 |
|
Andrade, M., & Ferreira, M. A. M. (2010). Civil identification problems with Bayesian networks using official DNA databases. Aplimat-Journal of Applied Mathematics, 3(3), 155-162. |
|
370 |
|
Kane, A. M. (2010). On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148. |
|
371 |
|
Panigrahy, S. K., Jena, D., Korra, S. B., & Jena, S. K. (2009). On the privacy protection of biometric traits: palmprint, face, and signature. In Contemporary Computing (pp. 182-193). Springer Berlin Heidelberg. |
|
372 |
|
Acharya, B., Panigrahy, S. K., Patra, S. K., & Panda, G. (2009). Image encryption using advanced hill cipher algorithm. International Journal of Recent Trends in Engineering, 1(1). |
|
373 |
|
Hamamreh, R. A., & Farajallah, M. (2009). Design of a robust cryptosystem algorithm for non-invertible matrices based on hill cipher. International Journal of Computer Science and Network Security, 11-16. |
|
374 |
|
S. Mansor,R bin Din, A. Samsudin. "Analysis of Natural Language Steganography". International Journal of Computer Science and Security (IJCSS), 3(2):62-153, 2009 |
|
375 |
|
Mansor, S., Din, R., & Samsudin, A. (2009). Analysis of natural language steganography. International Journal of Computer Science and Security (IJCSS), 3(2), 113. |
|
376 |
|
Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Williams, G. (2009). Evaluation of potential manufacturing suppliers using analytical hierarchy process and cluster analysis for benchmarking. International Journal of Security, 3(3), 36. |
|
377 |
|
Andrade, M., & Ferreira, M. A. M. (2009).Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74. |
|
378 |
|
Majhi, J. (2009).Modified hill-cipher and crt methods in galois field gf (2 m) for cryptography (Doctoral dissertation, National Institute Of Technology Rourkela). |
|
379 |
|
Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Williams, G. (2009). Evaluation of potential manufacturing suppliers using analytical hierarchy process and cluster analysis for benchmarking. International Journal of Security, 3(3), 36. |
|
380 |
|
Aboud, S. J. (2009). Secure E-payment Protocol. International Journal of Computer Science and Security, 3(3). |
|
381 |
|
Kaur, M., & Sofat, S. (2009). A Review on Biometrics Security Breaches and Remedies. Biometrics and Bioinformatics, 1(8), 92-98. |
|
382 |
|
Andrade, M., & Ferreira, M. A. M. (2009). Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74. |
|
383 |
|
Acharya, B., Patra, S. K., & Panda, G. (2009). Involutory, permuted and reiterative key matrix generation methods for Hill cipher system. matrix, 2, 1. |
|
384 |
|
Panigrahy, S. K., Acharya, B., & Jena, D. (2008). Image encryption using self-invertible key matrix of hill cipher algorithm. |
|
385 |
|
Nath, S. S., Chakdar, D., Gope, G., & Avasthi, D. K. (2008). Effect of 100 MeV nickel ions on silica coated ZnS quantum dots. Journal of Nanoelectronics and Optoelectronics, 3(2), 180-183. |
|
386 |
|
Asghar, S., & Umar, M. (2010). Requirement engineering challenges in development of software applications and selection of customer-off-the-shelf (COTS) components. International Journal of Software Engineering, 1(1), 32-50. |
|
387 |
|
El Zanfaly, D. S., Darwish, A., Gomaa, A. G., & Youssif, A. A. (2012, May).Heterogeneous data reduction model for payment request file of direct debit processes. In Informatics and Systems (INFOS), 2012 8th International Conference on (pp. DE-8). IEEE. |
|
388 |
|
PVGD, P. R. (2010). Particle swarm optimization in the fine-tuning of fuzzy software cost estimation models. International Journal of Software Engineering (IJSE), 1(2), 12-23. |
|
389 |
|
Nazir, S., Khan, M. A., Anwar, S., Khan, H., & Nazir, M. (2012, May). A novel fuzzy logic based software component selection modeling. In Information Science and Applications (ICISA), 2012 International Conference on (pp. 1-6). IEEE. |
|
390 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B. (2012). Fuzzy-Based Approach Using Enhanced Function Point to Evaluate the Performance of Software Project. IUP Journal of Computer Sciences, 6(2), 20. |
|
391 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B. (2013). Layered model to Estimate Effort, Performance and cost of the Software projects. International Journal of Computer Applications, 63(13), 17-23. |
|
392 |
|
Rai, D., & Tyagi, K. (2013, July). Estimating the regression test case selection probability using fuzzy rules. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 603-611). IEEE. |
|
393 |
|
Bhatia, S. M., & Sharma, A. K. (2014). Fuzzy Quality Function Deployment and Software Engineering-A Literature Review. Software Engineering and Technology, 6(6), 159-168. |
|
394 |
|
Iraji, M. S. (2015). Fuzzy Agent Oriented Software Effort Estimate with cocomo. |
|
395 |
|
Fatima, M., Ahmad, S. F., & Hasan, M. (2015). Fuzzy Based Software Cost Estimation Methods: A Comparative Study. International Journal for Innovative Research in Science and Technology, 1(7), 287-290. |
|
396 |
|
KUMAR, M. S. R., & SivaSubramanian, S. An Approach towards Developing an Efficient Software Cost Estimation System Using Fuzzy and Analogy Methods. |
|
397 |
|
Elgamel, M. S., Korani, E. A., & El Helow, K. R. Developing a Software Certification for Quality Assurance. |
|
398 |
|
Patil, M., & Sahu, V. (2013). A Survey of Compression and Encryption Techniques for SMS. |
|
399 |
|
Patil, M., Sahu, V., & Jain, A. (2014, January). SMS text Compression and Encryption on Android OS. In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE. |
|
400 |
|
Nan, Y., Wen, X., & Wang, S. (2014). The Technological Actuality of Human Aerospace Principle and the Possible Fact of UFO. Journal of Aerospace Science and Technology International aerospace science, 2, 53-68. |
|
401 |
|
South Britain, smell new, & Wang thought. (2014). Situation of human aerospace technology principle and the principle of UFO speculation The Technological Actuality of Human Aerospace Principle and the Possible Fact of UFO. Journal of Aerospace Science and Technology, 2014. |
|
402 |
|
Darbari, M., Asthana, R., & Singh, V. K. (2010). Integrating Fuzzy Mde-AT Framework for urban traffic simulation. International Journal of Software Engineering, 1(1). |
|
403 |
|
Kamalanathan, S., & Selvaraju, S. (2012). Collaborative Approaches for Personalized Web Search Using Fuzzy Neural Networks. In Global Trends in Information Systems and Software Applications (pp. 367-376). Springer Berlin Heidelberg. |
|
404 |
|
PVGD, P. R., & SNSVSC, R. Fuzzy Based Approach for Predicting Software Development Effort. |
|
405 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B.An enhanced model to estimate effort, performance and cost of the software projects. |
|
406 |
|
Racheal, B. O., & Adeosun, O. O. (2016). Employing The Use of Steganography for The Secured Transmission of Information In Mobile Devices. |
|
|
|