Works matching DE "INFORMATION technology security"
Results: 4459
Status of ICT in the University Libraries of Khyber Pakhtunkhwa.
- Published in:
- Pakistan Library & Information Science Journal, 2017, v. 48, n. 2, p. 37
- By:
- Publication type:
- Article
Analysing the EU's collective securitisation moves towards China.
- Published in:
- Asia Europe Journal, 2022, v. 20, n. 2, p. 195, doi. 10.1007/s10308-021-00640-4
- By:
- Publication type:
- Article
Cybersecurity for the Home and Office: The Lawyer's Guide to Taking Charge of Your Own Information Security.
- Published in:
- 2018
- By:
- Publication type:
- Book Review
Information wars as a threat to the information security of Ukraine.
- Published in:
- Conflict Resolution Quarterly, 2022, v. 39, n. 3, p. 333, doi. 10.1002/crq.21331
- By:
- Publication type:
- Article
Analytical Techniques for Decision Making on Information Security for Big Data Breaches.
- Published in:
- International Journal of Information Technology & Decision Making, 2018, v. 17, n. 2, p. 527, doi. 10.1142/S0219622017500432
- By:
- Publication type:
- Article
The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption.
- Published in:
- International Journal of Information Technology & Decision Making, 2016, v. 15, n. 1, p. 151, doi. 10.1142/S0219622015500364
- By:
- Publication type:
- Article
Stepwise Stimuli‐Responsive, Multicolor‐Chromic Perylene Bisimide/Polyvinyl Alcohol Co‐assembly System for Information Encryption.
- Published in:
- Chemistry - A European Journal, 2023, v. 29, n. 43, p. 1, doi. 10.1002/chem.202301074
- By:
- Publication type:
- Article
Long Persistent Luminescence from Metal–Organic Compounds: State of the Art.
- Published in:
- Advanced Functional Materials, 2023, v. 33, n. 19, p. 1, doi. 10.1002/adfm.202300735
- By:
- Publication type:
- Article
Engineering Orthogonal Upconversion through Selective Excitation in a Single Nanoparticle (Adv. Funct. Mater. 18/2023).
- Published in:
- Advanced Functional Materials, 2023, v. 33, n. 18, p. 1, doi. 10.1002/adfm.202370110
- By:
- Publication type:
- Article
Single‐Component 0D Metal–Organic Halides with Color‐Variable Long‐Afterglow toward Multi‐Level Information Security and White‐Light LED.
- Published in:
- Advanced Functional Materials, 2023, v. 33, n. 18, p. 1, doi. 10.1002/adfm.202214962
- By:
- Publication type:
- Article
Engineering Orthogonal Upconversion through Selective Excitation in a Single Nanoparticle.
- Published in:
- Advanced Functional Materials, 2023, v. 33, n. 18, p. 1, doi. 10.1002/adfm.202212037
- By:
- Publication type:
- Article
Thieno[3,4‐c][1,2,5]Thiadiazole‐Based Organic Conjugated Molecules with Visible and Near‐Infrared Dual Emissions for Luminescent Anti‐Counterfeiting Applications.
- Published in:
- Advanced Functional Materials, 2022, v. 32, n. 39, p. 1, doi. 10.1002/adfm.202205494
- By:
- Publication type:
- Article
Moisture‐Induced Reversible Phase Conversion of Cesium Copper Iodine Nanocrystals Enables Advanced Anti‐Counterfeiting.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 47, p. 1, doi. 10.1002/adfm.202105771
- By:
- Publication type:
- Article
An Integrated Luminescent Information Encryption–Decryption and Anticounterfeiting Chip Based on Laser Induced Graphene.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 43, p. 1, doi. 10.1002/adfm.202103255
- By:
- Publication type:
- Article
Flexible Vertical Photogating Transistor Network with an Ultrashort Channel for In‐Sensor Visual Nociceptor.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 36, p. 1, doi. 10.1002/adfm.202104327
- By:
- Publication type:
- Article
Polarization and Holography Recording in Real‐ and k‐Space Based on Dielectric Metasurface.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 27, p. 1, doi. 10.1002/adfm.202100406
- By:
- Publication type:
- Article
Core‐Shell Nanostructures: Dynamic Control of Orthogonal Upconversion in Migratory Core–Shell Nanostructure toward Information Security (Adv. Funct. Mater. 14/2021).
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 14, p. 1, doi. 10.1002/adfm.202170096
- By:
- Publication type:
- Article
Dynamic Control of Orthogonal Upconversion in Migratory Core–Shell Nanostructure toward Information Security.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 14, p. 1, doi. 10.1002/adfm.202009796
- By:
- Publication type:
- Article
Think Small for Big Impact.
- Published in:
- Advanced Functional Materials, 2020, v. 30, n. 37, p. 1, doi. 10.1002/adfm.201909678
- By:
- Publication type:
- Article
Think Small for Big Impact.
- Published in:
- Advanced Functional Materials, 2020, v. 30, n. 37, p. 1, doi. 10.1002/adfm.201909678
- By:
- Publication type:
- Article
Multistimuli‐Responsive Display Materials to Encrypt Differentiated Information in Bright and Dark Fields.
- Published in:
- Advanced Functional Materials, 2019, v. 29, n. 51, p. N.PAG, doi. 10.1002/adfm.201906068
- By:
- Publication type:
- Article
One Stimulus In Situ Induces Two Sequential Luminescence Switchings in the Same Solvent‐Fuming Process: Anthracene Excimer as the Intermediate.
- Published in:
- Advanced Functional Materials, 2019, v. 29, n. 34, p. N.PAG, doi. 10.1002/adfm.201901895
- By:
- Publication type:
- Article
Transient Electronics: High‐Temperature‐Triggered Thermally Degradable Electronics Based on Flexible Silicon Nanomembranes (Adv. Funct. Mater. 45/2018).
- Published in:
- Advanced Functional Materials, 2018, v. 28, n. 45, p. N.PAG, doi. 10.1002/adfm.201870323
- By:
- Publication type:
- Article
Asymptotic analysis of estimators on multi-label data.
- Published in:
- Machine Learning, 2015, v. 99, n. 3, p. 373, doi. 10.1007/s10994-014-5457-9
- By:
- Publication type:
- Article
Analysis of Security Threats in the Supply Chain of ICT Products Based on Evolutionary Game Theory.
- Published in:
- Group Decision & Negotiation, 2023, v. 32, n. 5, p. 1183, doi. 10.1007/s10726-023-09839-9
- By:
- Publication type:
- Article
An efficient and secure VoIP communication system with chaotic mapping and message digest.
- Published in:
- Multimedia Systems, 2018, v. 24, n. 3, p. 355, doi. 10.1007/s00530-017-0565-6
- By:
- Publication type:
- Article
A New Scalable Lightweight Grouping Proof Protocol for RFID systems.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 1, p. 133, doi. 10.1007/s11277-018-5430-1
- By:
- Publication type:
- Article
Design and Implementation of a System Security Experiment Platform Based on Cloud.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 1159, doi. 10.1007/s11277-017-5149-4
- By:
- Publication type:
- Article
A Method of Generating 8 × 8 Substitution Boxes Based on Elliptic Curves.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 1, p. 439, doi. 10.1007/s11277-018-5698-1
- By:
- Publication type:
- Article
Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 2, p. 2037, doi. 10.1007/s11277-017-4962-0
- By:
- Publication type:
- Article
A New Object Searching Protocol for Multi-tag RFID.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 3547, doi. 10.1007/s11277-017-4685-2
- By:
- Publication type:
- Article
Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5621, doi. 10.1007/s11277-017-4437-3
- By:
- Publication type:
- Article
The Analysis of Firewall Policy Through Machine Learning and Data Mining.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2891, doi. 10.1007/s11277-017-4330-0
- By:
- Publication type:
- Article
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 1, p. 5, doi. 10.1007/s11277-015-3153-0
- By:
- Publication type:
- Article
Information Security Evaluation Using Multi-Attribute Threat Index.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 913, doi. 10.1007/s11277-015-3140-5
- By:
- Publication type:
- Article
Injecting Subject Policy into Access Control for Strengthening the Protection of Personal Information.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 715, doi. 10.1007/s11277-015-3094-7
- By:
- Publication type:
- Article
Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 2, p. 621, doi. 10.1007/s11277-016-3297-6
- By:
- Publication type:
- Article
Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels.
- Published in:
- Wireless Personal Communications, 2016, v. 88, n. 3, p. 479, doi. 10.1007/s11277-015-3142-3
- By:
- Publication type:
- Article
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 3, p. 1467, doi. 10.1007/s11277-015-3001-2
- By:
- Publication type:
- Article
A Study on Factors Affecting the Adoption of LTE Mobile Communication Service: The Case of South Korea.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 1, p. 217, doi. 10.1007/s11277-015-2802-7
- By:
- Publication type:
- Article
ICA: An Incremental Clustering Algorithm Based on OPTICS.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 3, p. 2151, doi. 10.1007/s11277-015-2517-9
- By:
- Publication type:
- Article
Development of Security WLAN Protocol Based on Quantum GHZ Stats.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 1, p. 193, doi. 10.1007/s11277-014-2003-9
- By:
- Publication type:
- Article
An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 1, p. 383, doi. 10.1007/s11277-013-1511-3
- By:
- Publication type:
- Article
Key Management in Secure Satellite Multicast Using Key Hypergraphs.
- Published in:
- Wireless Personal Communications, 2013, v. 70, n. 4, p. 1859, doi. 10.1007/s11277-012-0785-1
- By:
- Publication type:
- Article
Yönetim Bilişim Sistemleri Kapsamında Akademik Araştırma Alanlarının İncelenmesi: Apriori Algoritması ile Bir Analiz.
- Published in:
- Gümüshane University Journal of Social Sciences (GUSBID) / Gümüshane Üniversitesi Sosyal Bilimler Dergisi (GUSBID), 2023, v. 14, n. 2, p. 680
- By:
- Publication type:
- Article
Akademisyenlerin Dijital Veri Güvenliği Farkındalıkları Üzerine Bir Araştırma: Malatya Örneği.
- Published in:
- Gümüshane University Journal of Social Sciences (GUSBID) / Gümüshane Üniversitesi Sosyal Bilimler Dergisi (GUSBID), 2023, v. 14, n. 2, p. 429
- By:
- Publication type:
- Article
Bekanntmachung eines Hinweises auf die Veröffentlichung der Technischen Richtlinien des Bundesamtes für Sicherheit in der Informationstechnik.
- Published in:
- FinanzRundschau, 2024, v. 106, n. 4, p. 196, doi. 10.9785/fr-2024-1060409
- Publication type:
- Article
Concern About Information Spillover and Choosing Auditor.
- Published in:
- Financial Management Perspective / Chashm/&āz-i Mudīriyyat-i Mālī, 2024, v. 14, n. 46, p. 9, doi. 10.48308/jfmp.2024.104894
- By:
- Publication type:
- Article
Evaluation of Urban Water Security Based on Information Substitutability Index Selection from the Perspective of Variable Weight.
- Published in:
- China Rural Water & Hydropower, 2022, n. 3, p. 54
- By:
- Publication type:
- Article
Blokzincir ve Kötü Amaçlı Yazılımların Kesişimi: Kapsamlı Bir İnceleme ve Analiz.
- Published in:
- Gazi Journal of Engineering Sciences (GJES) / Gazi Mühendislik Bilimleri Dergisi, 2023, v. 9, n. 4, p. 58, doi. 10.30855/gmbd.0705S07
- By:
- Publication type:
- Article