Browse Items (3 total)

Security and Privacy in Wireless and Mobile Networks.pdf
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing…

Implementing a One Address CPU in Logisim.pdf
Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users…

4. Information Systems.pdf
Students need to understand systems and the systems concept, and they need to understand the role of ICT in enabling systems. Students will learn the characteristics of good systems (e.g., intuitive, likable, error-resistant, fast, flexible, and the…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2