toggle visibility Search & Display Options

Select All    Deselect All
 | 
Citations
 | 
   print
Pomeroy, A. & T., Q. (2011). Effective SQL Injection Attack Reconstruction Using Network.. 11th IEEE International Conference on Computer and Information Technology (CIT 2011) and the 11th IEEE International Conference on Scalable Computing and Communications in Paphos.
toggle visibility
Darwish, A., Hassanien, A. E, Tan, Q., & Pal, N. R. (2011). Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure" Advances in Intelligent and Soft Computing. (Vol. 87, pp. 27–34). Soft Computing Models in Industrial and Environmental Applications, 6th International Conference.
toggle visibility
Chang, M., Chen, M.-P., Hwang, W.-Y., & Mueller, W. (2011). Proceedings of the 6th International Conference on E-Learning and Games. Taipei, Taiwan: Springer Lecture Notes in Computer Science.
toggle visibility
Kumar, V., Chang, M., & Leacock, T.L. (2011). Mobile Computing and Mixed-Initiative Support for Writing Competence. In Kinshuk and Rory McGreal F. L. Sabine Graf (Ed.), Intelligent and Adaptive Learning Systems – Technology Enhanced Support for Learners and Teachers (pp. 327–341). Hershey, PA:.
toggle visibility
Kumar, V., Chang, M., & Leacock, T. (2011). Ubiquitous Writing. Ubiquitous Learning. An International Journal, 3(3), 173–188.
toggle visibility
Select All    Deselect All
 | 
Citations
 | 
   print