Web
Education
(PDF) Techniques of Program Code Obfuscation for Secure ...
The paper investigates the most common obfuscation techniques for software program source code. Engineering elements of the compiling and interpreting processes are presented form the most widely ...
Different Obfuscation Techniques for Code Protection ...
Procedia Computer Science 70 ( 2015 ) 757 – 763 Available online at www.sciencedirect.com 1877-0509 © 2015 The Authors. Published by Elsevier B.V.
(PDF) Facial Recognition using OpenCV
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text.
Applied Computer Science and Cyber Security Team - www.acs ...
Assoc. Prof. Catalin BOJA Ph.D. is a member of Department of Economic Informatics and Cybernetics / Computer Science Department, Faculty of C.S.I.E/C.S.E.I, @ The Bucharest University of Economic Studies, Romania.Starting with October 2011, he is the Head of the D.I.C.E / D.E.I.C, and in April 2008 he has received, from the Academy of Economic Studies of Bucharest, his Ph.D. diploma in the ...
Single Page Web Applications Security
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015 ISSN 2067 – 4074 57 Social engineering is another way to gather sensitive information from users but it relies entirely on user weaknesses. One important principle in keeping sensitive data secure is avoid keeping it. Sensitive data should be kept only if it is
Methods and Techniques of Quality Management for ICT Audit ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 103 External quality – aims to meet customer expectations for a product or service; Internal quality – corresponds to the improvement of the organization’s internal operations; its beneficiaries are management and employees.
Android based Cost-Efficient AI Attendance System – IJERT
Facial Recognition using OpenCV, Journal of Mobile, Embedded and Distributed Systems(JMEDS),2014. Cristianini, N. and Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press,2000.
About the Conference | The 19th International Conference ...
The International Conference on INFORMATICS in ECONOMY (IE), Education, Research & Business Technologies, is held every year since 1993 in Bucharest, Romania.The Conference promotes research results in Business Informatics and related Computer Science topics: Cloud, Distributed and Parallel Computing, Mobile-Embedded and Multimedia Solutions, E-Society, Enterprise and Business Solutions ...
Freelance translator for IT content, English to German ...
Freelance translator and localizer English to German for IT companies. I translate your web sites, content marketing, customer communications, etc. Computing graduate with an additional degree in English and 20 years of translation experience.
[PDF] Internet Banking Two-Factor Authentication using ...
Journal of Mobile, Embedded and Distributed Systems This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed system will use the mobile phone as a software token and generate unique one time passwords (OTP) that will be used when authenticating to an Internet Banking application.
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.