Mobile Device Users’ Susceptibility to Phishing Attacks |
F. Ley Sylvester, Tarrant County College, USA |
Volume : 14 volume number : 1 pdf |
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation |
Tayeb Basta, Al Ghurair University, UAE |
Volume : 14 volume number : 1 pdf |
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing Applications in the Fog |
Márcio Miguel Gomes1, Rodrigo da Rosa Righi1, Cristiano André da Costa1 and Dalvan Griebler2, 1University of Vale do Rio dos Sinos - Brazil, 2Pontifical Catholic University of Rio Grande do Sul, Brazil |
Volume : 14 volume number : 1 pdf |
Accuracy of Garmin GPS Running Watches over Repetitive Trials on the Same Route |
Joe Dumas, University of Tennessee at Chattanooga, USA |
Volume : 14 volume number : 1 pdf |
Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic |
Shannon Roberson, Mohammad Abdus Salam, Mathieu Kourouma and Osman Kandara, Southern University and A&M College, USA |
Volume : 14 volume number : 1 pdf |
Encryption based Watermarking Technique for Security of Medical Image |
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria |
Volume : 14 volume number : 1 pdf |
Feature Extraction Methods for IRIS Recognition System: A Survey |
Tara Othman Qadir1, Nik Shahidah Afifi Md Taujuddin1 and Sundas Naqeeb Khan2, 1Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia, 2Universiti Tun Hussein Onn Malaysia, Malaysia |
Volume : 14 volume number : 1 pdf |