2020-N2-01
Deyan Mihaylov Determining the Critical Activities in a Complex Project Using Simulations., International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 3-14
|
 |
2020-N2-02
Manana Chumburidze, Tsira Beradze Cash Flows Management Algorithms and Their Applications., International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 15-24
|
 |
2020-N2-03
A. B. Cheryshov, O, N. Choporov, A. P. Preobrazhenskiy, O. Ja. Kravets The Development of Optimization Model and Algorithm for Support of Resources Management in Organizational System., International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 25-36
|
 |
2020-N2-04
Rositsa Doneva, Silvia Gaftandzhieva, Milen Bliznakov, Stanislava Bandeva . Learning Analytics Software Tool Supporting Decision Making in Higher Education., International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 37-46
|
 |
2020-N2-05
Alok Mishra, Deepti Mishra Sustainable Software Engineering Education Curricula Development., International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 47-56
|
 |
2020-N2-06
Mihail Digalovski, Goran Rafajlovski Distribution Transformer Mathematical Model for Power Losses Minimization, International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 57-68
|
 |
2020-N2-07
Rasim Salkoski, Ivan Chorbev Design Optimization and Testing of 200 AMPS Booster Transformer Based on Differential Evolution Algorithm, International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 69-82
|
 |
2020-N2-08
Chandrama Thorat, Vandana Inamdar, Bhagvat Jadhav TED: A Lightweight Block Cipher for IoT Devices with Side-Channel Attack Resistance, International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 83-96
|
 |
2020-N2-09
Tariq Shah, Ayesha Qureshi, Muhammad Fahad Khan Designing More Efficient Novel S8 S-Boxes, International Journal on Information Technologies and Security, No.2 (vol. 12), 2020, pp. 97-107
|
 |