2017-N3-01
Orges Çiço, Zamir Dika, Betim Çiço. High Reliability Approaches in Cloud Applications for Business – Reliability as a Service (RaaS) Model. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 3-18.
|
 |
2017-N3-02
Ejaz Qamar, Faria Sajjad, Saeeda Kouser, Saeed Ahmed An Optimized Handover Management System in 3G/4G-WLAN Using Genetic Algorithm. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 19-30.
|
 |
2017-N3-03
Muhammad Ramzan Talib, Muhammad Kashif Hanif, Zubair Nabi, Muhammad Umer Sarwar, Nafees Ayub. Text Mining of Judicial System’s CORPORA via Clause Elements. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 31-42.
|
 |
2017-N3-04
Erenis Ramadani, Agon Memeti, Bujar H. Durmishi. Water Quality Index: a New Automated Way of Measuring the Quality. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 43-52.
|
 |
2017-N3-05
Sofija Nikolova-Poceva, Anton Chaushevski, Dimitar Dimitrov. Determination of Optimal Hydro Generating Unit Combination in Operation. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 53-62.
|
 |
2017-N3-06
Belbergui Chaimaa, Elkamoun Najib, Rachid Hilal. Authentication Mechanisms in Cloud Computing Environments. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 63-84.
|
 |
2017-N3-07
Saeeda Kouser, Aihab Khan. A Novel Feature Extraction Approach: Capacity Based Zero-Text Steganography. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 85-98.
|
 |
2017-N3-08
Syed Imran, Aihab Khan, Basheer Ahmad. Text Steganography Utilizing XML, HTML and XHTML Markup Languages. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 99-116.
|
 |
2017-N3-09
Yoana Ivanova. Simulation Modelling and Assessing the Impact of Cyberattacks on Urban Automobile Transport Systems. International Journal on Information Technologies and Security, No. 3 (vol. 9), 2017, pp. 117-142.
|
 |