Dissemination of Information Communication Technologies: Mobile Government Practices in Developing States
暂无分享,去创建一个
[2] Arif Sari. Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks , 2014 .
[3] Arif Sari,et al. Potential issues and impacts of ICT applications through learning process in higher education , 2013 .
[4] Arif Sari,et al. Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment , 2015 .
[5] Booncharoen Sirinaovakul,et al. Introduction to the Special Issue , 2002, Comput. Intell..
[6] Arif Sari,et al. Countering PCIe Gen. 3 data transfer rate imperfection using serial data interconnect , 2013, 2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE).
[7] Elaine Lawrence,et al. Towards citizen centric mobile government services: A roadmap , 2006 .
[8] Arif Sari. Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite , 2015 .
[9] Arif Sari. WITHDRAWN: Influence of ICT Applications on Learning Process in Higher Education , 2014 .
[10] Arif Sari. Security Approaches in IEEE 802.11 MANET —Performance Evaluation of USM and RAS , 2014 .
[11] Alexander Osterwalder,et al. ICT in developing countries: A cross-sectoral snapshot. , 2003 .
[12] B. Yeoh,et al. Introduction: Mobile City Singapore , 2010 .
[13] Deployment Challenges of Offshore Renewable Energy Systems for Sustainability in Developing Countries , 2015 .
[14] Arif Sari,et al. Addressing security challenges in WiMAX environment , 2013, SIN.
[15] Ibrahim Kushchu,et al. m-Government: Cases of Developing Countries , 2004 .
[16] Arif Sari. Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks , 2015 .
[17] Sang M. Lee,et al. Current practices of leading e-government countries , 2005, Commun. ACM.
[18] Arif Sari,et al. Simulation of 802.11 Physical Layer Attacks in MANET , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[19] Arif Sari,et al. A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .
[20] A Bachfischer,et al. Towards understanding success factors in interactive mobile government , 2006 .
[21] Mahmut Güler,et al. ELEKTRONİK DEVLETTEN (E-DEVLET) MOBİL DEVLETE (M-DEVLET) GEÇİŞTE TÜRKİYE'DE YEREL YÖNETİM UYGULAMALARI , 2009 .
[22] Arif Sari. Securing Mobile Ad-Hoc Networks Against Jamming Attacks Through Unified Security Mechanism , 2012 .
[23] Arif Sari,et al. Ultra-fast Lithium cell charging architecture for Mission Critical Applications , 2014 .
[24] S. Al-Athel,et al. Report of the World Commission on Environment and Development: "Our Common Future" , 1987 .