Works matching DE "WEBSITE security"
1
- Government Technology, 2013, v. 26, n. 7, p. 7
- Article
2
- Government Technology, 2009, v. 22, n. 9, p. 22
- Article
3
- Government Technology, 2009, v. 22, n. 2, p. 46
- Article
4
- China Business Review, 2014, p. 1
- Article
5
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4315829
- Pu, Ao;
- Feng, Xia;
- Zhang, Yuhan;
- Wan, Xuelin;
- Han, Jiaxuan;
- Huang, Cheng
- Article
6
- Information (2078-2489), 2018, v. 9, n. 2, p. 27, doi. 10.3390/info9020027
- Martinez-Caro, Jose-Manuel;
- Aledo-Hernandez, Antonio-Jose;
- Guillen-Perez, Antonio;
- Sanchez-Iborra, Ramon;
- Cano, Maria-Dolores
- Article
7
- InfoM, 2010, n. 34, p. 42
- Joldžić, Ognjen;
- Đurić, Zoran
- Article
8
- IEEE Internet Computing, 2009, v. 13, n. 6, p. 37
- Article
10
- ComputerWorld Hong Kong, 2009, v. 26, n. 10, p. 8
- Article
11
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2009, v. 44, n. 1, p. 21
- Article
12
- Marketing Health Services, 2014, v. 34, n. 4, p. 5
- Article
13
- Journal of Research & Practice in Information Technology, 2014, v. 46, n. 1, p. 19
- Kumar, Rakesh;
- Kaur, Gurvinder
- Article
14
- Techno.com, 2023, v. 22, n. 2, p. 418, doi. 10.33633/tc.v22i2.7562
- Ariyadi, Tamsir;
- Widodo, Tantri Langgeng;
- Apriyanti, Nely;
- Kirana, Febriani Sasti
- Article
15
- Journal of Management Information Systems, 2002, v. 19, n. 1, p. 211, doi. 10.1080/07421222.2002.11045715
- Article
16
- International Journal of Advanced Research in Computer Science, 2022, v. 13, n. 4, p. 28, doi. 10.26483/ijarcs.v13i4.6890
- Kela, Rushabh;
- Chawla, Abhinav;
- Gaur, Pratishtha;
- K., Manikandan
- Article
17
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1979
- Sharma, Richa;
- Parekh, Chandresh
- Article
18
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 847
- Article
19
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 7, p. 127
- Vashist, Shikha;
- Gupta, Ayush
- Article
20
- Journal of Health Care Compliance, 2003, v. 5, n. 6, p. 53
- Article
21
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2633, doi. 10.23940/ijpe.18.11.p9.26332642
- Article
22
- Strategic Finance, 2003, v. 85, n. 3, p. 59
- Article
23
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 137
- Qian Hea;
- Ning Zhang;
- Jinshu Su;
- Yong Wang
- Article
24
- Egyptian Journal of Information Sciences, 2023, v. 10, n. 2, p. 32
- Article
25
- Journal of Natural Sciences & Mathematics (JNSM), 2024, v. 9, n. 17/18, p. 294, doi. 10.62792/ut.jnsm.v9.i17-18.p2824
- BAJRAMI, Enes;
- IDRIZI, Florim;
- RUSHITI, Agim
- Article
26
- 2017
- Collins, Sarah A.;
- Rozenblum, Ronen;
- Wai Yin Leung;
- Morrison, Constance R. C.;
- Stade, Diana L.;
- McNally, Kelly;
- Bourie, Patricia Q.;
- Massaro, Anthony;
- Bokser, Seth;
- Dwyer, Cindy;
- Greysen, Ryan S.;
- Agarwal, Priyanka;
- Thornton, Kevin;
- Dalal, Anuj K.;
- Leung, Wai Yin;
- Morrison, Constance Rc
- journal article
27
- Journal of the American Medical Informatics Association, 2008, v. 15, n. 5, p. 601, doi. 10.1197/jamia.M2702
- FRIEDLIN, F. JEFF;
- MCDONALD, CLEMENT J.
- Article
28
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 5, p. 711
- Hooda, Anita;
- Malhotra, Rupali
- Article
29
- ISeCure, 2017, v. 9, n. 2, p. 49
- Imani, Maryam;
- Montazer, Gholam Ali
- Article
30
- Computers, Materials & Continua, 2025, v. 83, n. 1, p. 115, doi. 10.32604/cmc.2025.062729
- Derea, Zaid;
- Zou, Beiji;
- Kui, Xiaoyan;
- Abdullah, Monir;
- Thobhani, Alaa;
- Abdussalam, Amr
- Article
31
- International Journal of Foundations of Computer Science, 2009, v. 20, n. 4, p. 597, doi. 10.1142/S0129054109006760
- DIXON, RYAN;
- EĞECIOĞLU, ÖMER;
- SHERWOOD, TIMOTHY
- Article
32
- International Journal of Human-Computer Interaction, 2008, v. 24, n. 3, p. 307, doi. 10.1080/10447310801937999
- Proctor, RobertW.;
- Ali, M. Athar;
- Vu, Kim-PhuongL.
- Article
33
- IEEE Transactions on Dependable & Secure Computing, 2014, v. 11, n. 5, p. 440, doi. 10.1109/TDSC.2013.45
- Fonseca, Jose;
- Vieira, Marco;
- Madeira, Henrique
- Article
34
- Social Behavior & Personality: an international journal, 2015, v. 43, n. 5, p. 729, doi. 10.2224/sbp.2015.43.5.729
- SEUNGSIN LEE;
- YOUNGHEE LEE;
- JOING-IN LEE;
- JUNGKUN PARK
- Article
35
- Iraqi Journal of Science, 2021, p. 174, doi. 10.24996/ijs.2021.SI.1.24
- Abdulkadhim, Mustafa;
- Hasan, Sami
- Article
36
- Computer Modeling in Engineering & Sciences (CMES), 2025, v. 142, n. 3, p. 2841, doi. 10.32604/cmes.2025.059586
- Derea, Zaid;
- Zou, Beiji;
- Kui, Xiaoyan;
- Thobhani, Alaa;
- Abdussalam, Amr
- Article
37
- Library Philosophy & Practice, 2016, p. 1
- Article
38
- CyberPsychology & Behavior, 2008, v. 11, n. 5, p. 549, doi. 10.1089/cpb.2007.0097
- Martín, Sonia San;
- Camarero, Carmen
- Article
40
- IETE Journal of Research, 2011, v. 57, n. 5, p. 413, doi. 10.4103/0377-2063.90150
- Singh, Brijendra;
- Agarwal, Pooja
- Article
41
- Journal of Internet Commerce, 2004, v. 3, n. 3, p. 1, doi. 10.1300/J179v03n03_01
- Hatch, Melanie L.;
- Hill, C. Jeanne;
- Rutledge, Arthur L.;
- Tillery, Kenneth R.
- Article
42
- Journal of the Australian Traditional Medicine Society, 2010, v. 16, n. 1, p. 23
- Article
43
- INFOCOMP: Journal of Computer Science, 2015, v. 14, n. 1, p. 14, doi. 10.18760/ic.14120152
- DWIVEDI, ASHISH KUMAR;
- RATH, SANTANU KUMAR
- Article
44
- International Journal of Interactive Mobile Technologies, 2024, v. 18, n. 19, p. 171, doi. 10.3991/ijim.v18i19.49437
- Navaneethan, S.;
- Kumar, S. Udhaya
- Article
45
- IEEE Internet Computing, 2009, v. 13, n. 4, p. 58
- Article
46
- IEEE Internet Computing, 2008, v. 12, n. 2, p. 38, doi. 10.1109/MIC.2008.40
- Bhatti, Rafae;
- Damiani, Maria Luisa;
- Bettis, David W.;
- Bertino, Ebsa
- Article
47
- IEEE Internet Computing, 2007, v. 11, n. 5, p. 17, doi. 10.1109/MIC.2007.113
- Missier, Paolo;
- Alper, Pinar;
- Corcho, Óscar;
- Dunlop, Ian;
- Goble, Carole
- Article
48
- Computer Science & Telecommunications, 2010, v. 29, n. 6, p. 56
- Ayofe, Azeez Nureni;
- Irwin, Barry
- Article
49
- Journal of the Bromeliad Society, 2014, v. 64, n. 4, p. 238
- Article
50
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1445, doi. 10.1007/s11277-014-1939-0
- Horng, Shi-Jinn;
- Tzeng, Shiang-Feng;
- Wang, Xian;
- Qiao, Shaojie;
- Gong, Xun;
- Khan, Muhammad
- Article