Severity: Warning
Message: preg_match(): Compilation failed: regular expression is too large at offset 114498
Filename: database/DB_query_builder.php
Line Number: 2415
Backtrace:
File: /home/prdbpk/public_html/application/models/Account_model.php
Line: 640
Function: count_all_results
File: /home/prdbpk/public_html/application/controllers/Front.php
Line: 1704
Function: get_multiple_publications_front
File: /home/prdbpk/public_html/index.php
Line: 315
Function: require_once
Severity: Warning
Message: preg_match(): Compilation failed: regular expression is too large at offset 114498
Filename: database/DB_query_builder.php
Line Number: 2415
Backtrace:
File: /home/prdbpk/public_html/application/models/Account_model.php
Line: 644
Function: get
File: /home/prdbpk/public_html/application/controllers/Front.php
Line: 1753
Function: get_multiple_publications_front
File: /home/prdbpk/public_html/index.php
Line: 315
Function: require_once
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 1
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 1
Author(s): S. Khalid, A. Mahboob, F.Azim, A.Rehman
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 1
Author(s): Rkia Aouinatou, Mostafa Belkasmi, Mohamed Askali
Keyword(s): Pairing, Miller, Smart Cards, Side Channels, DPA Attack, DFA Attack, IBE, IBC, Counter-measure
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 2
Author(s): Efe F. Orumwense, Thomas J. Afullo, Viranjay M. Srivastava
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 2
Author(s): Shadi Atalla, Saed Tarapiah, Mahmoud El Hendy, Kamarul Faizal Bin Hashim
Keyword(s): Optical Networks, clustering, Algorithms
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 2
Author(s): El Arbi Abdellaoui Alaoui, Said Agoujil, Moha Hajar, Youssef Qaraai
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 2
Author(s): Afshin Rezakhani, Hossein Shirazi, Naser Modiri
Keyword(s): Access Control, Plug-ins, Components, Data-Centric
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 2
Author(s): Amir Mehmood, Akhter Raza, Adnan Nadeem, Umair Saeed
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 2
Author(s): Maryam El Azhari, Ahmed Toumanari, Rachid Latif, Nadya El Moussaid
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 2
Author(s): Tadasuke Nozoe, Masahiko Noguchi, Minoru Sakuma, Mikio Isawa
Keyword(s): IMS, Live Migration, SIP, Virtualization