|
Author |
Title |
Year |
Publication |
Impact Factor |
Volume |
Pages |
Links |
|
Pomeroy, A. & Tan, Q. |
Effective SQL Injection Attack Reconstruction Using Network |
2011 |
|
|
|
|
|
|
Darwish, A., Hassanien, A. E, Tan, Q., & Pal, N. R. |
Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure" Advances in Intelligent and Soft Computing |
2011 |
|
|
87 |
27-34 |
|
|
Chang, W., & Tan, Q. |
Augmented Reality System Design and Scenario Study for Location-based Adaptive Mobile Learning |
2010 |
|
|
|
|
|
|
Chang, W.,Tan, Q., & Tao, F.W. |
Multi-Object Oriented Augmented Reality for Location-based Adaptive Mobile Learning |
2010 |
Advanced Learning Technologies (ICALT) |
|
|
|
|
|
Tao,F.W., & Tan,Q |
Data Mining Platform for augmented Reality on Mobile Learning |
2010 |
|
|
|
|
|