Issue Title
Vol 5, No 2 (2017) User tracking mechanisms and counter measures Abstract  PDF
Muhammad Aleem, Asra Ishtiaq, Salma Hussain Abbasi, Muhammad Arshad Islam
Vol 2, No 4 (2014) Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem Abstract  PDF
Artan Luma, Besnik Selimi, Lirim Ameti
Vol 4, No 1 (2016) Security, Privacy, Threats and Risks in Cloud Computing ― A Vital Review Abstract  PDF
Sumit Goyal
Vol 4, No 4 (2016) Improving Quality of Election Process Using Crowdsourcing Techniques Abstract  PDF
Blerim Rexha, Ilir Murturi, Isak Shabani, Avni Rexhepi
1 - 4 of 4 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"
© Prof.Dr. Ismail SARITAS 2013-2018     -    Address: Selcuk University, Faculty of Technology 42031 Selcuklu, Konya/TURKEY.