|
Pomeroy, A. & T., Q. (2011). Effective SQL Injection Attack Reconstruction Using Network.. 11th IEEE International Conference on Computer and Information Technology (CIT 2011) and the 11th IEEE International Conference on Scalable Computing and Communications in Paphos.
|
|
|
Darwish, A., Hassanien, A. E, Tan, Q., & Pal, N. R. (2011). Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure" Advances in Intelligent and Soft Computing. (Vol. 87, pp. 27–34). Soft Computing Models in Industrial and Environmental Applications, 6th International Conference.
|
|
|
Lo, E., & Tan, Q. (2010). Principles For Facilitating Collaboration In Mobile Environments.
|
|
|
Lin, R., Tan, Q., Kinshuk & Huang, Y.-M. (2010). Location-Based Knowledge Oriented Microblogging Framework, Architecture, and System for Mobile Learning. Wireless, Mobile and Ubiquitous Technologies in Education (WMUTE), .
|
|
|
Tan, Q., Jeng, Y-L., Huang, Y-M, Kinshuk, & Johnstine, R. (2009). Location-Based Dynamic Grouping Algorithm in Mobile Learning Environment.
|
|