Your selections:
Towards smart online dispute resolution for medical disputes
- Bellucci, Emilia, Stranieri, Andrew, Venkatraman, Sitalakshmi
Towards understanding corporate dilemma about social responsibility
- Nayak, Ravi, Venkatraman, Sitalakshmi, Moyeen, Abdul
Towards automatic image segmentation using optimised region growing technique
- Nicholson, Ann, Li, Xiaodong, Alazab, Mamoun, Islam, Mofakharul, Venkatraman, Sitalakshmi
A performance framework for corporate sustainability
- Venkatraman, Sitalakshmi, Nayak, Ravi
Effective digital forensic analysis of the NTFS disk image
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
A Grid-based neural network framework for multimodal biometrics
Virtual worlds: Not the final frontier for games-based nursing education
- Meredith, Grant, Achterbosch, Leigh, Turville, Kylie, Venkatraman, Sitalakshmi
Applying genetic alogorithm for optimizing broadcasting process in ad-hoc network
- Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi, Alazab, Mamoun
Mobile payment implementation: a reference framework
Towards understanding and improving E-government strategies in Jordan
- Alkhaleefah, Mohammad, Alkhawaldeh, Mahmoud, Venkatraman, Sitalakshmi, Alazab, Mamoun
Stochastic model based approach for biometric identification
- Islam, Mofakharul, Venkatraman, Sitalakshmi, Alazab, Mamoun
Six sigma approach to improve quality in e-services: An empirical study in Jordan
- Alhyari, Salah, Alazab, Moutaz, Venkatraman, Sitalakshmi, Alazab, Mamoun, Alazab, Ammar
Information security governance: The art of detecting hidden malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Self-learning framework for intrusion detection
Does the business size matter on corporate sustainable performance? The Australian business case
- Nayak, Ravi, Venkatraman, Sitalakshmi
An optimal transportation routing approach using GIS-based dynamic traffic flows
- Alazab, Ammar, Venkatraman, Sitalakshmi, Abawajy, Jemal, Alazab, Mamoun
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
Cloud computing: A research roadmap in coalescence with software engineering
- Venkatraman, Sitalakshmi, Wadhwa, Bimlesh
Malicious code detection using penalized splines on OPcode frequency
- Alazab, Mamoun, Al Kadiri, Mohammad, Venkatraman, Sitalakshmi, Al-Nemrat, Ameer
Analysis of firewall log-based detection scenarios for evidence in digital forensics
- Mukhtar, Rubiu, Al-Nemrat, Ameer, Alazab, Mamoun, Venkatraman, Sitalakshmi, Jahankhani, Hamid
Are you sure you would like to clear your session, including search history and login status?