Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2
Pages
|
Viewing 1-10 of 19 total results
(PDF) Techniques of Program Code Obfuscation for Secure ...
The paper investigates the most common obfuscation techniques for software program source code. Engineering elements of the compiling and interpreting processes are presented form the most widely ...
Different Obfuscation Techniques for Code Protection ...
Procedia Computer Science 70 ( 2015 ) 757 – 763 Available online at www.sciencedirect.com 1877-0509 © 2015 The Authors. Published by Elsevier B.V.
(PDF) Facial Recognition using OpenCV
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text.
Applied Computer Science and Cyber Security Team - www.acs ...
Assoc. Prof. Catalin BOJA Ph.D. is a member of Department of Economic Informatics and Cybernetics / Computer Science Department, Faculty of C.S.I.E/C.S.E.I, @ The Bucharest University of Economic Studies, Romania.Starting with October 2011, he is the Head of the D.I.C.E / D.E.I.C, and in April 2008 he has received, from the Academy of Economic Studies of Bucharest, his Ph.D. diploma in the ...
www.acs.ase.ro/acs-team
Average Rating (0 votes)
 Single Page Web Applications Security
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015 ISSN 2067 – 4074 57 Social engineering is another way to gather sensitive information from users but it relies entirely on user weaknesses. One important principle in keeping sensitive data secure is avoid keeping it. Sensitive data should be kept only if it is
Methods and Techniques of Quality Management for ICT Audit ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 103 External quality – aims to meet customer expectations for a product or service; Internal quality – corresponds to the improvement of the organization’s internal operations; its beneficiaries are management and employees.
https://arxiv.org/pdf/1201.0395
Average Rating (0 votes)
Android based Cost-Efficient AI Attendance System – IJERT
Facial Recognition using OpenCV, Journal of Mobile, Embedded and Distributed Systems(JMEDS),2014. Cristianini, N. and Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press,2000.
About the Conference | The 19th International Conference ...
The International Conference on INFORMATICS in ECONOMY (IE), Education, Research & Business Technologies, is held every year since 1993 in Bucharest, Romania.The Conference promotes research results in Business Informatics and related Computer Science topics: Cloud, Distributed and Parallel Computing, Mobile-Embedded and Multimedia Solutions, E-Society, Enterprise and Business Solutions ...
Freelance translator for IT content, English to German ...
Freelance translator and localizer English to German for IT companies. I translate your web sites, content marketing, customer communications, etc. Computing graduate with an additional degree in English and 20 years of translation experience.
https://www.proz.com/translator/125774
Average Rating (0 votes)
[PDF] Internet Banking Two-Factor Authentication using ...
Journal of Mobile, Embedded and Distributed Systems This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed system will use the mobile phone as a software token and generate unique one time passwords (OTP) that will be used when authenticating to an Internet Banking application.
1 2
Pages
|