Search Results - IJCSI Press
Search alternatives:
-
1
Broad view of cryptographic hash functions
Published 2013“…IJCSI Press …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
-
5
Fuzzy set conjoint model in describing students’ perceptions on computer algebra system learning environment
Published 2011“…IJCSI Press …”
Get full text
Get full text
Get full text
Article -
6
Scenario Based Worm Trace Pattern Identification Technique
Published 2010Get full text
Get full text
Get full text
Article -
7
Biologically Inspired Execution Framework for Vulnerable Workflow Systems
Published 2009Get full text
Get full text
Article -
8
-
9
-
10
-
11
A New Generic Taxonomy on Hybrid Malware Detection Technique
Published 2009Get full text
Get full text
Get full text
Article -
12
Review of e-Government Policy and Outcomes in the kingdom of Saudi Arabia
Published 2011Get full text
Get full text
Article -
13
Benchmarking of Bat-inspired Interaction Testing Strategy
Published 2016Get full text
Get full text
Get full text
Article -
14
Shape assignment by genetic algorithm towards designing optimal areas
Published 2010“…IJCSI Press…”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
-
18
-
19
-
20
Novel genetic algorithm towards implementing a lining-layout optimization strategy.
Published 2010“…IJCSI Press …”
Get full text
Get full text
Article
