Works matching DE "COMPUTER crime prevention"
1
- SAM Advanced Management Journal (Society for Advancement of Management), 2016, v. 81, n. 2, p. 4
- Article
2
- SAM Advanced Management Journal (Society for Advancement of Management), 2016, v. 81, n. 2, p. 1
- Article
3
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
- Gandhi, Usha Devi;
- Kumar, Priyan Malarvizhi;
- Kadu, Shreyas;
- Varatharajan, R.;
- Manogaran, Gunasekaran;
- Sundarasekar, Revathi
- Article
4
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 943, doi. 10.1007/s11277-018-5735-0
- Zhang, Lei;
- Li, Jing;
- Yang, Songtao;
- Wang, Bin;
- Bian, Xingchao
- Article
5
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1677, doi. 10.1007/s11277-018-5661-1
- Singh, Manminder;
- Arora, A. S.
- Article
6
- Wireless Personal Communications, 2013, v. 68, n. 2, p. 361, doi. 10.1007/s11277-011-0456-7
- Article
7
- Journal: American Water Works Association, 2020, v. 112, n. 6, p. 48, doi. 10.1002/awwa.1518
- Article
8
- Journal: American Water Works Association, 2020, v. 112, n. 3, p. 70, doi. 10.1002/awwa.1466
- Ohrt, Andrew;
- Morley, Kevin M.;
- Groves, Dan;
- Cox, Joel
- Article
9
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1802
- Samuel, Sneha;
- Gupta, Archana
- Article
10
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part1, p. 31
- Agarwal, Shalabh;
- Mukherjee, Anweshan
- Article
11
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 524
- Kumar, Abhishek;
- Senapati, Kishore Kumar;
- Patnaik, K. Sridhar
- Article
12
- Computers (2073-431X), 2022, v. 11, n. 12, p. 174, doi. 10.3390/computers11120174
- Rawindaran, Nisha;
- Jayal, Ambikesh;
- Prakash, Edmond
- Article
13
- Computers (2073-431X), 2021, v. 10, n. 11, p. 150, doi. 10.3390/computers10110150
- Rawindaran, Nisha;
- Jayal, Ambikesh;
- Prakash, Edmond
- Article
14
- IM + io, 2023, n. 3, p. 54
- Article
15
- IM + io, 2023, n. 3, p. 50
- Hessel, Stefan;
- Callewaert, Christoph
- Article
16
- International Journal on Criminology, 2014, v. 2, n. 1, p. 11
- Article
17
- PM World Journal, 2015, v. 4, n. 3, p. 1
- Article
18
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 1, p. 58, doi. 10.18372/2225-5036.30.18604
- Tkachov, Andrii;
- Korolov, Roman;
- Rahimova, Irada;
- Aksonova, Iryna;
- Sevriukova, Yelyzaveta
- Article
19
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 1, p. 5, doi. 10.18372/2225-5036.25.13664
- Корченко, Олександр;
- Логінов, Ігор;
- Скворцов, Сергій
- Article
20
- Ukrainian Scientific Journal of Information Security, 2018, v. 24, n. 3, p. 181, doi. 10.18372/2225-5036.24.13429
- Милов, Александр;
- Евсеев, Сергей;
- Алексеев, Владимир
- Article
21
- Veterinary Ireland Journal, 2022, v. 12, n. 9, p. 504
- Article
22
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 519, doi. 10.12716/1001.15.03.04
- Meland, P. H.;
- Bernsmed, K.;
- Wille, E.;
- Rødseth, Ø. J.;
- Nesheim, D. A.
- Article
23
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 1, p. 27, doi. 10.12716/1001.15.01.01
- Erstad, E.;
- Ostnes, R.;
- Lund, M. S.
- Article
24
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00517-4
- Dalal, Surjeet;
- Lilhore, Umesh Kumar;
- Foujdar, Neetu;
- Simaiya, Sarita;
- Ayadi, Manel;
- Almujally, Nouf A.;
- Ksibi, Amel
- Article
25
- International Journal of Information Dissemination & Technology, 2013, v. 3, n. 3, p. 222
- Article
26
- British Journal of Criminology, 2021, v. 61, n. 5, p. 1407, doi. 10.1093/bjc/azab026
- Collier, Ben;
- Clayton, Richard;
- Hutchings, Alice;
- Thomas, Daniel
- Article
27
- British Journal of Criminology, 2018, v. 58, n. 2, p. 414, doi. 10.1093/bjc/azx021
- Article
28
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 291, doi. 10.14569/ijacsa.2024.0150430
- Yulianto, Semi;
- Soewito, Benfano;
- Gaol, Ford Lumban;
- Kurniawan, Aditya
- Article
29
- International Journal of Production Research, 2023, v. 61, n. 15, p. 5266, doi. 10.1080/00207543.2022.2100840
- Shukla, Mayank;
- Sarmah, S.P.;
- Tiwari, Manoj Kumar
- Article
30
- International Journal of Production Research, 2022, v. 60, n. 4, p. 1368, doi. 10.1080/00207543.2020.1856442
- Article
31
- International Journal of Production Research, 2022, v. 60, n. 1, p. 162, doi. 10.1080/00207543.2021.1984606
- Melnyk, Steven A.;
- Schoenherr, Tobias;
- Speier-Pero, Cheri;
- Peters, Chris;
- Chang, Jeff F.;
- Friday, Derek
- Article
32
- International Journal of Intelligence & Counterintelligence, 2019, v. 32, n. 3, p. 433, doi. 10.1080/08850607.2019.1605804
- Article
33
- Future Internet, 2021, v. 13, n. 2, p. 39, doi. 10.3390/fi13020039
- Ulven, Joachim Bjørge;
- Wangen, Gaute;
- Kambourakis, Georgios
- Article
34
- Future Internet, 2020, v. 12, n. 9, p. 157, doi. 10.3390/fi12090157
- Article
35
- Future Internet, 2020, v. 12, n. 4, p. 62, doi. 10.3390/fi12040062
- Article
36
- Future Internet, 2019, v. 11, n. 3, p. 63, doi. 10.3390/fi11030063
- Yeboah-Ofori, Abel;
- Islam, Shareeful
- Article
37
- Future Internet, 2018, v. 10, n. 1, p. 1, doi. 10.3390/fi10010001
- Almas Shehni, Rezvan;
- Faez, Karim;
- Eshghi, Farshad;
- Kelarestaghi, Manoochehr
- Article
38
- Annals (Constanţa Maritime University), 2011, v. 12, n. 15, p. 159
- Article
39
- Science & Military Journal, 2014, v. 9, n. 1, p. 63
- Article
40
- Symmetry (20738994), 2015, v. 7, n. 2, p. 546, doi. 10.3390/sym7020546
- Hai-Cheng Chu;
- Jong Hyuk Park
- Article
41
- Journal of Information System Security, 2021, v. 17, n. 3, p. 145
- Article
42
- Journal of Information System Security, 2019, v. 15, n. 1, p. 61
- Article
43
- Journal of Information System Security, 2014, v. 10, n. 1, p. 79
- Article
44
- Journal of Information System Security, 2012, v. 8, n. 2, p. 19
- Article
45
- Journal of Information System Security, 2012, v. 8, n. 2, p. 1
- Article
46
- Journal of Information System Security, 2012, v. 8, n. 1, p. 21
- Whitman, Michael E.;
- Mattord, Herbert J.
- Article
47
- Journal of Information System Security, 2012, v. 8, n. 1, p. 3
- Phelps, Daniel C.;
- Gathegi, John N.;
- Workman, Michael;
- Misook Heo
- Article
48
- Buletin Stiintific, 2023, v. 28, n. 2, p. 162, doi. 10.2478/bsaft-2023-0016
- BURTON, Sharon L.;
- BURRELL, Darrell Norman;
- NOBLES, Calvin;
- JONES, Laura A.
- Article
49
- Buletin Stiintific, 2021, v. 26, n. 2, p. 109, doi. 10.2478/bsaft-2021-0013
- Article
50
- Buletin Stiintific, 2021, p. 154
- Article