-
How Can We Identify Hijacked Journals?
- M Dadkhah, MM Obeidat, MD Jazi, T Sutikno, MA Riyadi
-
Bulletin of Electrical Engineering and Informatics 4 (2), 83-87
|
55 |
-
Data encryption and authetication using public key approach
- S Nagaraj, G Raju, V Srinadth
-
Procedia Computer Science 48, 126-132
|
31 |
-
Phishing or hijacking? Forgers hijacked DU journal by copying content of another authenticate journal
- M Dadkhah, T Sutikno
-
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 3 (3 …
|
30 |
-
Relevant words extraction method for recommendation system
- N Naw, EE Hlaing
-
Bulletin of Electrical Engineering and Informatics 2 (3), 169-176
|
26 |
-
Data encryption and authentication using public key approach
- S Nagaraj, G Raju, V Srinadth
-
Procedia Computer Science 48, 126-132
|
25 |
-
Control of power and voltage of solar grid connected
- B Abd Allah, L Djamel
-
Bulletin of Electrical Engineering and Informatics 5 (1), 37-44
|
24 |
-
Control of power and voltage of solar grid connected
- B Abd Allah, L Djamel
-
Bulletin of Electrical Engineering and Informatics 5 (1), 37-44
|
22 |
-
A survey on wireless network simulators
- AS Toor, AK Jain
-
Bulletin of Electrical Engineering and Informatics 6 (1), 62-69
|
20 |
-
Fault detection and classification in transmission line using wavelet transform and ANN
- P Sharma, D Saini, A Saxena
-
Bulletin of Electrical Engineering and Informatics 5 (3), 284-295
|
20 |
-
Energy aware heuristic approach for cluster head selection in wireless sensor networks
- AT ME, JJS ME, AK Priya, R Maarlin, M Harinetha
-
Bulletin of Electrical Engineering and Informatics 6 (1), 70-75
|
19 |