An Ensemble Method for Intrusion Detection with Conformity to Data Variability
DOI: 10.5176/2251-2136_ICT-BDCS17.24
Authors: Mwitondi, K., Said, R. and Zargari, S.
AN EVALUATION OF THE IMPACT OF ICT TECHNOLOGIES PRACTICE ON INTERNAL CONTROL SECURITY SYSTEM
DOI: 10.5176/2251-2136_ICT14.08
Authors: Tonderai Muchenje and Progress Kariga
An Information Quality Approach to Enterprise-Wide Service-Oriented Architecture Initiative
DOI: 10.5176/2251-2136_ICT-BDCS17.46
Authors: Muhammad Suhaizan Sulong, Azlianor Abdul-Aziz, Andy Koronios, Jing Gao
AN INTELLIGENT DIGITAL LIBRARY SYSTEM
DOI: 10.5716/2251-2136_ICT04
Authors: Amosa B.M.G, Hameed M.A. , Fabiyi A.O
Analysis and Design of Multi-Agent System for Processing Bio-Signals Using Agent Oriented Programming Approach with JADE
DOI: 10.5176/978-981-08-7240-3_I-90
Authors: Tholkappia Arasu Govindarajan, Ramesh Manickam, Vinoth Kumar M. and Rajavignesh R.
Application of Parallel Distributed Event Driven Simulation for Accelerating Hardware Verification
DOI: 10.5176/2251-1652_ADPC12.04
Authors: Tariq Ahmad, Seiyang Yang, Maciej Ciesielski and Dusung Kim
Applying Information Quality Dimensions in the Web Development Process
DOI: 10.5176/2251-2136_ICT-BDCS17.47
Authors: Azlianor Abdul-Aziz, Muhammad Suhaizan Sulong, Andy Koronios, Jing Gao
