2009
2009
Volume 2, Number 2, 2009 June
-
- Mobile Queries in GIS, Debnath Bhattacharyya, Debasri Chakraborty, Poulami Das, Samir Kumar Bandyopadhyay, and Tai-hoon Kim (pp. 1-10).
- A Preprocessing Algorithm to Implement Greedy-MRS for Selecting a Hierarchical Reliable Multicast Proxy, R. Sasikala and K. Duraiswamy (pp. 11-26).
- Assessment of the Vulnerabilities of SCADA, Control Systems and Critical Infrastructure Systems, Rosslin John Robles and Min-kyu Choi (pp. 27-34).
- Data Filtering for Handheld Device Application, Maricel O. Balitanas (pp. 35-42).
- Methodology for Penetration Testing, Farkhod Alisherov A., Feruza Sattarova Y. (pp. 43-50).