Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 11-20 of 50 total results
Cristian Valeriu Toma - Google Scholar Citations
Journal of Mobile, Embedded and Distributed Systems 6 (4), 135-146, 2014. 7: 2014: Using genetic algorithms in software optimization. I Ivan, C Boja, M Vochin, I Nitescu, C Toma, M Popa. Proc. Of the 6th WSEAS Int. Conference on Telecommunications and Informatics ...
 Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
Page:Approaches on Internet of Things Solutions.pdf/2 ...
Figure 1. Internet of Things components. A Smart Object contains IoT data and information, also metadata and software agent code resources, such as application software event handler. Samples of Smart Objects are embedded devices such as Rasberry Pi, Arduino, BeagleBone/Ninja Blocks. The data model for broad interoperability is represented by the Smart Object API.
 File:Approaches on Internet of Things Solutions.pdf ...
This file is licensed under the Creative Commons Attribution 3.0 Unported license.: You are free: to share – to copy, distribute and transmit the work; to remix – to adapt the work; Under the following conditions: attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way ...
 Single Page Web Applications Security
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015 ISSN 2067 – 4074 57 Social engineering is another way to gather sensitive information from users but it relies entirely on user weaknesses. One important principle in keeping sensitive data secure is avoid keeping it. Sensitive data should be kept only if it is
Database Versioning 2.0, a Transparent SQL Approach Used ...
References [1] Cosmin Cioranu, Marius Cioca, Database Versioning, a Transparent SQL Approach, Journal of Mobile, Embedded and Distributed Systems; vol. V, no. 1, 2013, ISSN 2067-4074. [2] Filip F.G., A decision-making perspective for designing and building information systems, International Journal of Computers Communications and Control, 7(2 ...
[1201.0397] Hiding Malicious Content in PDF Documents
Abstract: This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign) concept. The algorithm is fairly simple: the attacker generates a polymorphic file that has two different types of content (text, as a PDF document for example, and image: TIFF - two of the most widely used file ...
https://arxiv.org/abs/1201.0397
Average Rating (0 votes)
Methods and Techniques of Quality Management for ICT Audit ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 103 External quality – aims to meet customer expectations for a product or service; Internal quality – corresponds to the improvement of the organization’s internal operations; its beneficiaries are management and employees.
https://arxiv.org/pdf/1201.0395
Average Rating (0 votes)
Applied Computer Science and Cyber Security Team - www.acs ...
Assoc. Prof. Catalin BOJA Ph.D. is a member of Department of Economic Informatics and Cybernetics / Computer Science Department, Faculty of C.S.I.E/C.S.E.I, @ The Bucharest University of Economic Studies, Romania.Starting with October 2011, he is the Head of the D.I.C.E / D.E.I.C, and in April 2008 he has received, from the Academy of Economic Studies of Bucharest, his Ph.D. diploma in the ...
www.acs.ase.ro/acs-team
Average Rating (0 votes)
1 2 3 4 5
Pages
|