Personal information

Activities

Works (4)

The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS

Computers
2022-04 | Journal article | Author
Contributors: Dhurate Hyseni; Nimete Piraj; BETIM CICO; Isak Shabani
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

The proposed model to increase security of sensitive data in cloud computing

International Journal of Advanced Computer Science and Applications
2018 | Journal article
EID:

2-s2.0-85049500023

Part of ISSN: 21565570 2158107X
Contributors: Hyseni, D.; Selimi, B.; Luma, A.; Cico, B.
Source: Self-asserted source
Dhurate Hyseni via Scopus - Elsevier

End-user software reliability in the case of the inventory tracking system in university of prishtina

Advances in Intelligent Systems and Computing
2014 | Book
EID:

2-s2.0-84927925974

Part of ISSN: 21945357
Contributors: Shabani, I.; Cico, B.; Hyseni, D.; Halilaj, F.
Source: Self-asserted source
Dhurate Hyseni via Scopus - Elsevier

The increase of the web application reliability to the end users

CEUR Workshop Proceedings
2013 | Conference paper
EID:

2-s2.0-84924814742

Part of ISSN: 16130073
Contributors: Shabani, I.; Çiço, B.; Hyseni, D.; Halilaj, F.
Source: Self-asserted source
Dhurate Hyseni via Scopus - Elsevier