Professional Documents
Culture Documents
Haoues, M., Sellami, A., Ben-Abdallah, H., & Cheikhi, L. (2017). A guideline for software
https://doi.org/10.1007/s13198-016-0546-8
Portability
Fang, J., Zhao, Z., Wen, C., & Wang, R. (2017). Design and performance attributes driving
https://doi.org/10.1016/j.ijinfomgt.2017.03.003
Nayebi, F., Desharnais, J. M., & Abran, A. (2012). The state of the art of mobile application
usability evaluation. 2012 25th IEEE Canadian Conference on Electrical and Computer
https://doi.org/10.1109/CCECE.2012.6334930
Security
Samtani, S., Chinn, K., Larson, C., & Chen, H. (2016). AZSecure Hacker Assets Portal: Cyber
https://doi.org/10.1109/ISI.2016.7745437
Ding, X., Yang, Y., & Deng, R. H. (2011). Database access pattern protection without full-
Samtani, S., Chinn, K., Larson, C., & Chen, H. (2016). AZSecure Hacker Assets Portal: Cyber
https://doi.org/10.1109/ISI.2016.7745437