Countries Visited: Ethiopia, Qatar, U.A.E, Kenya and
Saudi Arabia.
International Journals:
1. "Data and Information Storage Security from Advanced Persistent Attack in Cloud Computing"[DOC]
2. "Detection and Prevention of Premium Number Fraud in Mobile Computing" [DOC]
3. “Bandwidth
Calculation in IEEE 802.16 Networks” [DOC]
4. “High
Performance Computing and Virtual Networking in the Area of Biometrics” [Doc]
International Conferences:
1.“Trust, Security and Privacy in E-Commerce and
E-Business” [DOC]
2.“Data Security, Privacy, Policies and Procedures
in Internet Usage”[DOC]
3. “Innovations
and Developments in Semantic Web-based Digital Libraries”[DOC]
National Conferences:
1.“Wireless Sensor Networks for Monitoring
Underground Coal Mine Operations” [DOC]
2. “A Practical Approach to Packet Filter Design”
3. "Cryptography-Mathematical Foundations for the Rapid Development of E-Commerce" [DOC]
4. "Security Issues and Privacy Policies of Cloud Computing for E-Libraries"[DOC]
Countries Visited: Ethiopia, Qatar, U.A.E, Kenya and
Saudi Arabia.
International Journals:
1. "Data and Information Storage Security from Advanced Persistent Attack in Cloud Computing"[DOC]
2. "Detection and Prevention of Premium Number Fraud in Mobile Computing" [DOC]
3. “Bandwidth Calculation in IEEE 802.16 Networks” [DOC]
4. “High
Performance Computing and Virtual Networking in the Area of Biometrics” [Doc]International Journals:
1. "Data and Information Storage Security from Advanced Persistent Attack in Cloud Computing"[DOC]
2. "Detection and Prevention of Premium Number Fraud in Mobile Computing" [DOC]
3. “Bandwidth Calculation in IEEE 802.16 Networks” [DOC]
International Conferences:
1.“Trust, Security and Privacy in E-Commerce and
E-Business” [DOC]2.“Data Security, Privacy, Policies and Procedures in Internet Usage”[DOC]
3. “Innovations and Developments in Semantic Web-based Digital Libraries”[DOC]
National Conferences:
1.“Wireless Sensor Networks for Monitoring Underground Coal Mine Operations” [DOC]
2. “A Practical Approach to Packet Filter Design”
3. "Cryptography-Mathematical Foundations for the Rapid Development of E-Commerce" [DOC]
4. "Security Issues and Privacy Policies of Cloud Computing for E-Libraries"[DOC]