Works matching DE "COMPUTER crime prevention"
1
- Simulation & Gaming, 2020, v. 51, n. 5, p. 586, doi. 10.1177/1046878120933312
- Coenraad, Merijke;
- Pellicone, Anthony;
- Ketelhut, Diane Jass;
- Cukier, Michel;
- Plane, Jan;
- Weintrop, David
- Article
2
- International Review of Law, Computers & Technology, 2020, v. 34, n. 1, p. 87, doi. 10.1080/13600869.2019.1700434
- Jerman Blažič, Borka;
- Klobučar, Tomaž
- Article
3
- International Review of Law, Computers & Technology, 2018, v. 32, n. 1, p. 21, doi. 10.1080/13600869.2018.1418142
- Article
4
- International Review of Law, Computers & Technology, 2018, v. 32, n. 1, p. 2, doi. 10.1080/13600869.2018.1417764
- Article
5
- International Review of Law, Computers & Technology, 2018, v. 32, n. 1, p. 37, doi. 10.1080/13600869.2018.1417763
- Article
6
- International Review of Law, Computers & Technology, 2018, v. 32, n. 1, p. 80, doi. 10.1080/13600869.2018.1431871
- Article
7
- Government Technology, 2022, v. 35, n. 7, p. 42
- Article
9
- Government Technology, 2019, v. 32, n. 7, p. 44
- Article
10
- Government Technology, 2018, v. 31, n. 7, p. 46
- Article
11
- Government Technology, 2018, v. 31, n. 3, p. 48
- Article
12
- Government Technology, 2017, v. 30, n. 7, p. 28
- Article
13
- Government Technology, 2016, v. 29, n. 7, p. 42
- Article
14
- Government Technology, 2016, v. 29, n. 7, p. 48
- Article
15
- Government Technology, 2016, v. 29, n. 7, p. 40
- Article
16
- Government Technology, 2011, v. 24, n. 3, p. 27
- Article
17
- Computing & Control Engineering, 2003, v. 14, n. 5, p. 4
- Article
22
- Systems, 2019, v. 7, n. 2, p. 21, doi. 10.3390/systems7020021
- Carter, Bryan;
- Adams, Stephen;
- Bakirtzis, Georgios;
- Sherburne, Tim;
- Beling, Peter;
- Horowitz, Barry;
- Fleming, Cody
- Article
23
- Ingénierie des Systèmes d'Information, 2023, v. 28, n. 5, p. 1275, doi. 10.18280/isi.280516
- Parvez, Mohammad Tanvir;
- Alsuhibani, Abdulaziz Mohmmad;
- Alamri, Ahmad Hussein
- Article
24
- Law, State & Telecommunications Review / Revista de Direito, Estado e Telecomunicações, 2023, v. 15, n. 2, p. 187, doi. 10.26512/lstr.v15i2.45997
- Anatolievich Shestak, Viktor;
- Dmitrievna Tsyplakova, Alyona
- Article
25
- Law, State & Telecommunications Review / Revista de Direito, Estado e Telecomunicações, 2022, v. 14, n. 2, p. 94, doi. 10.26512/lstr.v14i2.41411
- Vilks, Andrejs;
- Kipane, Aldona;
- Kudeikina, Inga;
- Palkova, Karina;
- Grasis, Jānis
- Article
26
- American Journal of Criminal Justice, 2012, v. 37, n. 3, p. 396, doi. 10.1007/s12103-011-9131-5
- Holt, Thomas;
- Bossler, Adam
- Article
27
- Space & Defense, 2015, v. 8, n. 1, p. 47, doi. 10.32873/uno.dc.sd.08.01.1122
- Article
28
- 2015
- Singh, Nimisha;
- Rishi, Abha
- Case Study
29
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2021, v. 11, n. 4, p. 296, doi. 10.15276/imms.v11.no4.296
- Мехед, Д. Б.;
- Мехед, К. М.
- Article
30
- Defense Counsel Journal, 2015, v. 82, n. 2, p. 143, doi. 10.12690/0161-8202-82.2.143
- Ablon, Lillian;
- Libicki, Martin
- Article
31
- Journal of Psychological & Educational Research, 2017, v. 25, n. 1, p. 93
- Baic, Valentina;
- Ivanovic, Zvonimir;
- Simeunovic-Patic, Biljana
- Article
32
- Computer und Recht, 2024, v. 40, n. 6, p. i, doi. 10.9785/cr-2024-frontmatter4006
- Article
33
- China Business Review, 2013, p. 10
- Article
34
- Journal of Strategic Innovation & Sustainability, 2020, v. 15, n. 6, p. 68, doi. 10.33423/jsis.v15i6.3596
- Xiang (Michelle) Liu;
- Murphy, Diane
- Article
36
- Security & Communication Networks, 2022, v. 2022, p. 1, doi. 10.1155/2022/8477260
- Li, Yongfei;
- Guo, Yuanbo;
- Fang, Chen;
- Liu, Yingze;
- Chen, Qingli
- Article
37
- New Perspectives on Healthcare Risk Management, Control & Governance, 2021, v. 40, n. 1, p. 26
- Article
38
- Productivity, 2024, v. 65, n. 1, p. 1, doi. 10.32381/PROD.2024.65.01.1
- KUMAR, VANDANA AJAY;
- BHARDWAJ, SACHIN;
- LATHER, MAHIPAL
- Article
39
- Productivity, 2024, v. 65, n. 1, p. 68, doi. 10.32381/PROD.2024.65.01.7
- Article
40
- Information & Security, 2022, v. 53, n. 1, p. 7, doi. 10.11610/isij.5300
- Sharkov, George;
- Mees, Wim
- Article
41
- Information & Security, 2019, v. 43, n. 1-3, p. 175, doi. 10.11610/isij.4315
- Article
42
- Information & Security, 2019, v. 43, n. 1-3, p. 145, doi. 10.11610/isij.4313
- Article
43
- Information (2078-2489), 2023, v. 14, n. 11, p. 587, doi. 10.3390/info14110587
- Chindrus, Cristian;
- Caruntu, Constantin-Florin
- Article
44
- Information (2078-2489), 2022, v. 13, n. 1, p. 22, doi. 10.3390/info13010022
- Ben Farah, Mohamed Amine;
- Ukwandu, Elochukwu;
- Hindy, Hanan;
- Brosset, David;
- Bures, Miroslav;
- Andonovic, Ivan;
- Bellekens, Xavier
- Article
45
- Information (2078-2489), 2021, v. 12, n. 9, p. 349, doi. 10.3390/info12090349
- Paul, Stéphane;
- Naouar, Douraid;
- Gureghian, Emmanuel
- Article
46
- International Journal of Advances in Soft Computing & Its Applications, 2022, v. 14, n. 1, p. 102, doi. 10.15849/IJASCA.220328.08
- Article
47
- LESIJ - Lex ET Scientia International Journal, 2009, v. 16, n. 2, p. 538
- Article
48
- IT Professional, 2014, v. 16, n. 1, p. 16, doi. 10.1109/MITP.2014.4
- Article
49
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 4, p. 620, doi. 10.1007/s12083-014-0275-1
- Article
50
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 645, doi. 10.1007/s12083-012-0195-x
- Lin, Shu-Chiung;
- Chen, Patrick;
- Chang, Chia-Ching
- Article