Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability. | 0 | 0.34 | 2021 |
Detection and Classification of Attacks on IoT Networks. | 0 | 0.34 | 2018 |
The effects of ICT use and ICT Laws on corruption: A general deterrence theory perspective. | 2 | 0.36 | 2018 |
Machine learning for psychiatric patient triaging: an investigation of cascading classifiers. | 0 | 0.34 | 2018 |
Grandon.com Got Hacked! | 0 | 0.34 | 2017 |
A Cybersecurity Executive DBA? | 0 | 0.34 | 2017 |
ICT as a corruption deterrent: a research note | 1 | 0.35 | 2015 |
A data driven framework for early prediction of customer response to promotions | 0 | 0.34 | 2015 |
ICT as a Corruption Deterrent: A Theoretical Perspective | 0 | 0.34 | 2015 |
Extreme value theory and neural network for catastrophic fall prediction: a study of year 2008-2009. | 0 | 0.34 | 2014 |
On a deadlock and performance analysis of ALBR and DAR algorithm on X-Torus topology by optimal utilization of Cross Links and minimal lookups | 5 | 0.46 | 2012 |
A Single Tape Deterministic Turing Machine of Adaptive Deterministic Routing Algorithm Designed for Torus Network | 0 | 0.34 | 2009 |
Improved-AntNet: ACO Routing Algorithm in Practice | 1 | 0.36 | 2009 |
Adaptive Load Balanced Routing Algorithm for X-Torus Topology | 0 | 0.34 | 2009 |
Single Tape Deterministic Turing Machine of Routing Algorithms Designed for Torus Network | 0 | 0.34 | 2009 |
Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol | 0 | 0.34 | 2008 |
Finite-State Modeling and Testing of Image Based Authentication System | 0 | 0.34 | 2008 |