Mobile Device Users’ Susceptibility To Phishing Attacks |
F. Ley Sylvester |
Vol 14, No 1 (2022), Pagination: 1-18
|
ABSTRACT |
PDF
|
|
Abstract Views: 320 |
PDF Views: 144
|
Steam++ An Extensible End-to-end Framework For Developing Iot Data Processing Applications In The Fog |
Márcio Miguel Gomes, Rodrigo da Rosa Righi, Cristiano André da Costa, Dalvan Griebler |
Vol 14, No 1 (2022), Pagination: 31-51
|
ABSTRACT |
PDF
|
|
Abstract Views: 281 |
PDF Views: 146
|
Accuracy Of Garmin GPS Running Watches Over Repetitive Trials On The Same Route |
Joe Dumas |
Vol 14, No 1 (2022), Pagination: 53-62
|
ABSTRACT |
PDF
|
|
Abstract Views: 1511 |
PDF Views: 153
|
Safely Scaling Virtual Private Network For A Major Telecom Company During A Pandemic |
Shannon Roberson, Mohammad Abdus Salam, Mathieu Kourouma, Osman Kandara |
Vol 14, No 1 (2022), Pagination: 63-74
|
ABSTRACT |
PDF
|
|
Abstract Views: 319 |
PDF Views: 160
|
Encryption Based Watermarking Technique For Security Of Medical Image |
Abderrahmane Daham, Mohamed ouslim |
Vol 14, No 1 (2022), Pagination: 75-97
|
ABSTRACT |
PDF
|
|
Abstract Views: 320 |
PDF Views: 146
|
Feature Extraction Methods For Iris Recognition System: A Survey |
Tara Othman Qadir, Nik Shahidah Afifi Md Taujuddin, Sundas Naqeeb Khan |
Vol 14, No 1 (2022), Pagination: 99-110
|
ABSTRACT |
PDF
|
|
Abstract Views: 311 |
PDF Views: 149
|