![]() | ![]() |
2008 | ||
---|---|---|
2 | EE | W. D. Yu, S. Nargundkar, N. Tiruthani: A phishing vulnerability analysis of web based systems. ISCC 2008: 326-331 |
1 | EE | W. D. Yu, J. Patel, M. Chitralamuthu, S. S. Parakh: An empirical approach to a system design methodology for mobile Peer-to-Peer computing. ISCC 2008: 501-506 |
1 | M. Chitralamuthu | [1] |
2 | S. Nargundkar | [2] |
3 | S. S. Parakh | [1] |
4 | J. Patel | [1] |
5 | N. Tiruthani | [2] |