Applications and techniques in information and network security

Abawajy, Jemal H. and Islam, Rafiqul 2017, Applications and techniques in information and network security, Concurrency computation, vol. 29, no. 23, pp. 1-4, doi: 10.1002/cpe.4351.

Attached Files
Name Description MIMEType Size Downloads

Title Applications and techniques in information and network security
Author(s) Abawajy, Jemal H.ORCID iD for Abawajy, Jemal H.
Islam, Rafiqul
Journal name Concurrency computation
Volume number 29
Issue number 23
Article ID e4351
Start page 1
End page 4
Total pages 4
Publisher Wiley
Place of publication Chichester, Eng.
Publication date 2017-12-10
ISSN 1532-0626
Keyword(s) Science & Technology
Computer Science, Software Engineering
Computer Science, Theory & Methods
Computer Science
Language eng
DOI 10.1002/cpe.4351
Field of Research 0805 Distributed Computing
0803 Computer Software
HERDC Research category CN Other journal article
ERA Research output type X Not reportable
Copyright notice ©2017, John Wiley & Sons
Persistent URL

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 10 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Mon, 04 Dec 2017, 15:28:37 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact