toggle visibility Search & Display Options

Select All    Deselect All
 | 
Citations
 | 
   print
Pomeroy, A. & T., Q. (2011). Effective SQL Injection Attack Reconstruction Using Network.. 11th IEEE International Conference on Computer and Information Technology (CIT 2011) and the 11th IEEE International Conference on Scalable Computing and Communications in Paphos.
toggle visibility
Darwish, A., Hassanien, A. E, Tan, Q., & Pal, N. R. (2011). Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure" Advances in Intelligent and Soft Computing. (Vol. 87, pp. 27–34). Soft Computing Models in Industrial and Environmental Applications, 6th International Conference.
toggle visibility
Lo, E., & Tan, Q. (2010). Principles For Facilitating Collaboration In Mobile Environments.
toggle visibility
Lin, R., Tan, Q., Kinshuk & Huang, Y.-M. (2010). Location-Based Knowledge Oriented Microblogging Framework, Architecture, and System for Mobile Learning. Wireless, Mobile and Ubiquitous Technologies in Education (WMUTE), .
toggle visibility
Tan, Q., Jeng, Y-L., Huang, Y-M, Kinshuk, & Johnstine, R. (2009). Location-Based Dynamic Grouping Algorithm in Mobile Learning Environment.
toggle visibility
Select All    Deselect All
 | 
Citations
 | 
   print