Works matching DE "DATABASE security"
1
- Records Management Quarterly (1986), 1992, v. 26, n. 3, p. 20
- Fireworker, Robert B.;
- Geier, Patrick
- Article
2
- Electrical Engineering, 2024, v. 106, n. 5, p. 5787, doi. 10.1007/s00202-024-02319-6
- Singh, Mahesh Pal;
- Sinha, Nidul
- Article
3
- Distributed Computing, 2022, v. 35, n. 3, p. 265, doi. 10.1007/s00446-022-00420-2
- Siek, Konrad;
- Wojciechowski, Paweł T.
- Article
4
- Cihan University-Erbil Scientific Journal, 2024, v. 8, n. 1, p. 70, doi. 10.24086/cuesj.v8n1y2024.pp70-79
- Jasim, Khalid F.;
- Zeki, Akram M.
- Article
5
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 470, doi. 10.1049/iet-ifs.2019.0086
- Li, Jinguo;
- Wen, Mi;
- Zhang, Kai
- Article
6
- EAI Endorsed Transactions on Cloud Systems, 2017, v. 3, n. 11, p. 1, doi. 10.4108/eai.11-4-2018.154463
- Article
7
- Turkish Journal of Medical Sciences, 2020, v. 50, n. 1, p. 132, doi. 10.3906/sag-1908-35
- ÖZDEMİR, Tarkan;
- YILMAZ DEMİRCİ, Nilgün;
- KILIÇ, Hatice;
- KOÇ, Orhan;
- KAYA, Akın;
- ÖZTÜRK, Can
- Article
8
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2020, v. 23, n. 2, p. 185, doi. 10.21279/1454-864x-20-i2-025
- Article
9
- ISSA Journal, 2022, v. 20, n. 5, p. 8
- Article
10
- ISSA Journal, 2022, v. 20, n. 2, p. 13
- Article
11
- ISSA Journal, 2021, v. 19, n. 12, p. 8
- Article
12
- ISSA Journal, 2021, v. 19, n. 8, p. 7
- Article
13
- ISSA Journal, 2019, v. 17, n. 4, p. 22
- Article
14
- ISSA Journal, 2018, v. 16, n. 8, p. 10
- Ferrante, Anthony J.;
- Hsu, D. Frank
- Article
15
- Geomatics & Information Science of Wuhan University, 2022, v. 47, n. 11, p. 1946, doi. 10.13203/j.whugis20200219
- Article
16
- Malaysian Journal of Computer Science, 2021, v. 34, n. 1, p. 1, doi. 10.22452/mjcs.vol34no1.1
- Shah, Saeed Arif;
- Khan, Imran Ali;
- Kazmi, Syed Zaki Hassan;
- Md Nasaruddin, Fariza Hanum Binti
- Article
17
- Malaysian Journal of Computer Science, 2020, p. 1, doi. 10.22452/mjcs.sp2020no1.1
- Raj, R. Joshua Samuel;
- Prakash, M. Viju;
- Prince, T.;
- Shankar, K.;
- Varadarajan, Vijayakumar;
- Nonyelu, Fredi
- Article
18
- Business Informatics / Informatyka Ekonomiczna, 2015, v. 3, n. 37, p. 48, doi. 10.15611/ie.2015.3.04
- Article
19
- Journal of Contingencies & Crisis Management, 2009, v. 17, n. 4, p. 221, doi. 10.1111/j.1468-5973.2009.00592.x
- Van Eeten, Michel;
- Bauer, Johannes M.
- Article
20
- Buletin Stiintific, 2023, v. 28, n. 1, p. 55, doi. 10.2478/bsaft-2023-0006
- MOCEAN, Loredana;
- VLAD, Miranda-Petronella
- Article
21
- Studia Universitatis Babes-Bolyai, Iurisprudentia, 2009, n. 3, p. 61
- Article
22
- Wool Textile Journal, 2010, v. 38, n. 9, p. 49
- Shao Jing-feng;
- Li Yong-gang;
- Ren Ke-jian;
- Dang Jin-fang;
- Li Min;
- Qin Lan-shuang
- Article
23
- Thermal Science, 2024, v. 28, n. 6B, p. 5205, doi. 10.2298/TSCI2406205B
- BAHADDAD, Adel;
- ASIF, Muhammad;
- ASHRAF, M. Usman;
- ASIRI, Yousef;
- ALKHALAF, Salem
- Article
24
- PLoS ONE, 2023, v. 18, n. 12, p. 1, doi. 10.1371/journal.pone.0290165
- Hernández Gress, Eva Selene;
- Flegl, Martin;
- Krstikj, Aleksandra;
- Boyes, Christina
- Article
25
- PLoS ONE, 2023, v. 18, n. 8, p. 1, doi. 10.1371/journal.pone.0286856
- Article
26
- Bulletin of Science, Technology & Society, 2008, v. 28, n. 1, p. 4, doi. 10.1177/0270467607311488
- Steeves, Valerie;
- Webster, Cheryl
- Article
27
- Bulletin of Science, Technology & Society, 2008, v. 28, n. 1, p. 80, doi. 10.1177/0270467607310591
- Article
28
- Bulletin of Science, Technology & Society, 2008, v. 28, n. 1, p. 48, doi. 10.1177/0270467607310589
- Article
29
- Bulletin of Science, Technology & Society, 2008, v. 28, n. 1, p. 37, doi. 10.1177/0270467607311483
- Article
30
- Bulletin of Science, Technology & Society, 2008, v. 28, n. 1, p. 69, doi. 10.1177/0270467607311485
- Article
31
- Bulletin of Science, Technology & Society, 2008, v. 28, n. 1, p. 20, doi. 10.1177/0270467607311484
- Article
32
- Journal of Telecommunications & Information Technology, 2019, n. 3, p. 27, doi. 10.26636/jtit.2019.134319
- Erfani, Seyedeh Hamideh;
- Mortazavi, Reza
- Article
33
- Economic Computation & Economic Cybernetics Studies & Research, 2019, v. 53, n. 3, p. 113, doi. 10.24818/18423264/53.3.19.07
- NICA, Elvira;
- TUDORICA, Bogdan George;
- DUSMANESCU, Dorel-Mihail;
- POPESCU, Gheorghe;
- BREAZ, Alina Maria
- Article
34
- Journal of Research & Practice in Information Technology, 2009, v. 41, n. 2, p. 135
- Blanco, Carlos;
- De Guzmán, Ignacio García-Rodríguez;
- Rosado, David G.;
- Fernández-Medina, Eduardo;
- Trujillo, Juan
- Article
35
- Operations Research, 2007, v. 55, n. 5, p. 890, doi. 10.1287/opre.1070.0407
- Nunez, Manuel A.;
- Garfinkel, Robert S.;
- Gopal, Ram D.
- Article
36
- Operations Research, 1984, v. 32, n. 1, p. 23, doi. 10.1287/opre.32.1.23
- Babad, Yair M.;
- Hoffer, Jeffrey A.
- Article
37
- Chemistry & Technology of Fuels & Oils, 2023, v. 59, n. 2, p. 394, doi. 10.1007/s10553-023-01539-z
- Huang, Yanrong;
- Han, Dan;
- He, Zhiyi;
- Zheng, Zhan;
- Wei, Bo
- Article
38
- SAR Journal (2619-9955), 2025, v. 8, n. 1, p. 42, doi. 10.18421/SAR81-05
- Palen, Wenchel Dave S.;
- Cabel, Clyde D.;
- Iserio, Bryan I.;
- Sico, Neil S.;
- Diola, Aldin O.;
- Agoylo Jr., Jose C.
- Article
39
- Pharmaceutical Sciences Asia, 2022, v. 49, n. 2, p. 123, doi. 10.29090/psa.2022.02.21.086
- Luangmonkong, Theerut;
- Wongsaardsakul, Jiratchaya;
- Laobutree, Rujipas;
- Jindarat, Sarawut;
- Jaisupa, Nattapon
- Article
40
- Review of Computer Engineering Studies, 2022, v. 9, n. 2, p. 82, doi. 10.18280/rces.090207
- Alaluosi, Wasan Maddah;
- Mohammed, Ahmed Saud
- Article
41
- Methaodos: Social Science Journal / Methaodos: Revista de Ciencias Sociales, 2022, v. 10, n. 2, p. 366, doi. 10.17502/mrcs.v10i2.583
- Antón Hurtado, Fina;
- Javier García, Andrés
- Article
42
- Geopolitics, 2022, v. 27, n. 1, p. 113, doi. 10.1080/14650045.2020.1830764
- Article
43
- Internal Auditor, 2018, v. 75, n. 4, p. 19
- Article
44
- Internal Auditor, 2007, v. 64, n. 6, p. 21
- Article
45
- Internal Auditor, 1998, v. 55, n. 1, p. 54
- Article
46
- Advances in Electrical & Electronic Engineering, 2017, v. 15, n. 2, p. 192, doi. 10.15598/aeee.v15i2.2164
- ABDELLAH, Mohamed Refaat;
- MOHAMED, Hesham Aboelsoud;
- BADRAN, Khaled Shafee;
- SENOUSY, Mohamed Badr
- Article
47
- System Dynamics Review (Wiley), 2008, v. 24, n. 3, p. 349, doi. 10.1002/sdr.405
- Dutta, Amitava;
- Roy, Rahul
- Article
48
- Computational Intelligence, 2019, v. 35, n. 4, p. 693, doi. 10.1111/coin.12209
- Tufail, Hina;
- Zafar, Kashif;
- Baig, Abdul Rauf
- Article
49
- 2023
- and Communication Networks, Security
- Correction Notice
50
- Telkomnika, 2022, v. 20, n. 4, p. 858, doi. 10.12928/TELKOMNIKA.v20i4.23367
- Shawkat, Shihab A.;
- Al-Barazanchi, Israa
- Article