Works matching DE "COMPUTER security management"
1
- Government Technology, 2016, v. 29, n. 7, p. 36
- Article
2
- Government Technology, 2016, v. 29, n. 7, p. 30
- Article
3
- Government Technology, 2016, v. 29, n. 7, p. 24
- Article
4
- Government Technology, 2016, v. 29, n. 7, p. 18
- Article
5
- Government Technology, 2016, v. 29, n. 7, p. 5
- Article
6
- Government Technology, 2011, v. 24, n. 9, p. 24
- Article
7
- Personal & Ubiquitous Computing, 2019, v. 23, n. 5/6, p. 777, doi. 10.1007/s00779-017-1096-z
- Al-Obeidat, F.;
- El-Alfy, E.-S. M.
- Article
8
- International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 2, p. 147, doi. 10.1007/s10009-013-0290-1
- Article
9
- Journal of International Affairs, 2016, v. 70, n. 1, p. 161
- Article
10
- Computing & System Journal (C&S) / Revista de Sistemas e Computação (RSC), 2019, v. 9, n. 1, p. 119, doi. 10.36558/22372903-2019v9n1-p8
- Molina, Denison;
- Silveira, Sidnei Renato;
- Beux dos Santos, Fernando
- Article
12
- Journal of Medical Internet Research, 2012, v. 14, n. 1, p. 33, doi. 10.2196/jmir.1906
- Cipresso, Pietro;
- Gaggioli, Andrea;
- Serino, Silvia;
- Cipresso, Sergio;
- Riva, Giuseppe
- Article
13
- Bulletin of the Atomic Scientists, 2016, v. 72, n. 5, p. 284, doi. 10.1080/00963402.2016.1216502
- Gross, Michael L.;
- Canetti, Daphna;
- Vashdi, Dana R.
- Article
14
- Bulletin of the Atomic Scientists, 2012, v. 68, n. 5, p. 75, doi. 10.1177/0096340212459039
- Article
15
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4380037
- Article
16
- Information (2078-2489), 2022, v. 13, n. 11, p. 533, doi. 10.3390/info13110533
- Romero Izurieta, Richard;
- Toapanta Toapanta, Segundo Moisés;
- Caucha Morales, Luis Jhony;
- Hifóng, María Mercedes Baño;
- Gómez Díaz, Eriannys Zharayth;
- Mafla Gallegos, Luis Enrique;
- Maciel Arellano, Ma. Roció;
- Orizaga Trejo, José Antonio
- Article
17
- International Journal of InformaticsTechnologies, 2010, v. 3, n. 2, p. 1
- Can, Özgü;
- Ünalir, Murat Osman
- Article
18
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 86, doi. 10.1007/s12083-012-0141-y
- Shafiee Sarjaz, Behrooz;
- Abbaspour, Maghsoud
- Article
19
- IEEE Internet Computing, 2009, v. 13, n. 6, p. 39, doi. 10.1109/MIC.2009.95
- Feeney, Kevin;
- Lewis, David;
- O'Sullivan, Declan
- Article
20
- ComputerWorld Hong Kong, 2016, p. 40
- Article
21
- ComputerWorld Hong Kong, 2016, p. 37
- Article
22
- ComputerWorld Hong Kong, 2011, v. 28, n. 3, p. 24
- Article
24
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/2379274
- Article
25
- Journal of Supercomputing, 2012, v. 62, n. 2, p. 804, doi. 10.1007/s11227-012-0754-1
- Syed, Raheel;
- Pazardzievska, Jasmina;
- Bourgeois, Julien
- Article
26
- Journal of Oriental Scientific Research / E-Şarkiyat Ilmi Arastirmalar Dergisi, 2020, v. 12, n. 1, p. 122, doi. 10.26791/sarkiat.606122
- Article
27
- Intel Technology Journal, 2014, v. 18, n. 4, p. 198
- Nagisetty, Ramune;
- Booth, Cory
- Article
28
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- Edwards, Jonathan;
- Grewal, Ken;
- LeMay, Michael;
- Robinson, Scott H.;
- Sahita, Ravi;
- Woodward, Carl
- Article
29
- Intel Technology Journal, 2014, v. 18, n. 4, p. 162
- Bhargav-Spantzel, Abhilasha
- Article
30
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- Dmitrienko, Alexandra;
- Liebchen, Christopher;
- Rossow, Christian;
- Sadeghi, Ahmad-Reza
- Article
31
- Intel Technology Journal, 2014, v. 18, n. 4, p. 120
- Smith, Ned M.;
- Sheller, Micah;
- Heldt-Sheller, Nathan
- Article
32
- Intel Technology Journal, 2014, v. 18, n. 4, p. 98
- Whitelam, Cameron;
- Bourlai, Thirimachos
- Article
33
- Intel Technology Journal, 2014, v. 18, n. 4, p. 80
- Article
34
- Intel Technology Journal, 2014, v. 18, n. 4, p. 46
- Cornelius, Cory;
- Gutierrez, Christopher N.
- Article
35
- Intel Technology Journal, 2014, v. 18, n. 4, p. 8
- Martin, Jason;
- Rajan, Anand;
- Steigerwald, Bob
- Article
36
- Revista Derecho del Estado, 2009, n. 23, p. 37
- Article
37
- Financial Innovation, 2016, v. 2, n. 1, p. 1, doi. 10.1186/s40854-016-0045-6
- Article
38
- Pepperdine Policy Review, 2013, v. 6, p. 1
- Article
39
- International Journal of Advanced Research in Computer Science, 2022, v. 13, n. 4, p. 6, doi. 10.26483/ijarcs.v13i4.6835
- Saeed, Khalid Mohammed Osman
- Article
40
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 837, doi. 10.26483/ijarcs.v8i7.4505
- Pandey, Vimmi;
- Dubey, Mridula
- Article
41
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 820, doi. 10.26483/ijarcs.v8i7.4491
- Article
42
- Journal of Information System Security, 2012, v. 8, n. 2, p. 3
- Chowdhuri, Romilla;
- Dhillon, Gurpreet
- Article
43
- Strategic Finance, 2002, v. 84, n. 3, p. 32
- Article
44
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 603, doi. 10.1093/jigpal/jzs036
- Article
45
- MIS Quarterly, 2014, v. 38, n. 2, p. 451
- Juhee Kwon;
- Johnson, M. Eric
- Article
46
- Management Science, 2011, v. 57, n. 5, p. 934, doi. 10.1287/mnsc.1100.1304
- August, Terrence;
- Tunca, Tunay I.
- Article
47
- Information Systems Management, 2016, v. 33, n. 1, p. 2, doi. 10.1080/10580530.2015.1117842
- Hanus, Bartlomiej;
- Wu, Yu "Andy"
- Article
48
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 10, p. 1
- Prabha, Rama;
- Jayanthi R., K. P.
- Article
49
- Journal of Computer Networks & Communications, 2022, p. 1, doi. 10.1155/2022/9049420
- Article
50
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 153, doi. 10.14569/ijacsa.2024.0150617
- Article