Privacy protection in published data using an efficient clustering method
DOI: 10.5176/978-981-08-7240-3_I-89
Authors: Md. Manzoor Murshed and Jeffrey W. Ohlmann
QT: A Quality Testing Tool for Data-Intensive Applications
DOI: 10.5176/2251-2136_ICT-BDCS17.49
Authors: Giuliano Casale, Ahmad Alnafessah
Recent Advances In Private Communications With Optical Chaos
DOI: 10.5176/2382-5669_ICT-BDCS15.47
Authors: Valerio Annovazzi-Lodi, Giuseppe Aromataris and Mauro Benedetti
Scalability and Operational Metrics of various BigData Analytics Engines Bigdata Analytics
DOI: 10.5176/2382-5669_ICT-BDCS15.27
Authors: Somina Venkata Surya Brahma Linga Sarma
SCCOF: Smart Cooperative Computation Offloading Framework for Mobile Cloud Computing Services
DOI: 10.5176/2251-2136_ICT-BDCS17.04
Authors: Ali Al-ameri and Ihsan Alshahib Lami
Social Networking Security Risks Extending Symbolic Interactionism and Honeycomb Model For Suggested Action
DOI: 10.5176/2382-5669_ICT-BDCS15.53
Authors: Kennedy Njenga and Victor Thobakgale
Study On Key Technology For Encryption And Security System In Wireless Communication Network
DOI: 10.5176/978-981-08-7240-3_I-27
Authors: Hsien-Wei Tseng, Rong-Hou Wu, Chih-Yuan Lo, Yang-Han Lee, Liang-Yu Y
