Works matching DE "COMPUTER security"
2
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- Article
3
- Information Systems & e-Business Management, 2016, v. 14, n. 1, p. 101, doi. 10.1007/s10257-015-0276-5
- Goldstein, Anat;
- Frank, Ulrich
- Article
4
- Information Systems & e-Business Management, 2012, v. 10, n. 4, p. 455, doi. 10.1007/s10257-011-0173-5
- Wang, Ju;
- Guo, Minzhe;
- Wang, Hao;
- Zhou, Linfeng
- Article
5
- Information Systems & e-Business Management, 2012, v. 10, n. 4, p. 521, doi. 10.1007/s10257-011-0176-2
- Parthasarathy, Rashmi;
- Shirazi, Behrooz;
- Peterson, Nina;
- Song, Wen-Zhan;
- Hurson, Ali
- Article
6
- Information Systems & e-Business Management, 2012, v. 10, n. 4, p. 429, doi. 10.1007/s10257-012-0204-x
- Sheldon, Frederick;
- McDonald, J.
- Article
7
- Information Systems & e-Business Management, 2012, v. 10, n. 1, p. 117, doi. 10.1007/s10257-010-0157-x
- Kokemüller, Jochen;
- Roßnagel, Heiko
- Article
8
- Information Systems & e-Business Management, 2010, v. 8, n. 2, p. 169, doi. 10.1007/s10257-009-0112-x
- Li, Jiexun;
- Wang, Harry;
- Zhang, Zhu;
- Zhao, J.
- Article
9
- Information Systems & e-Business Management, 2004, v. 2, n. 1, p. 127, doi. 10.1007/s10257-003-0030-2
- Hung, Patrick C. K.;
- Guang-Sha Qiu
- Article
11
- Technical Communication, 2000, v. 47, n. 2, p. 264
- Ray, Deborah S.;
- Ray, Eric J.
- Article
12
- Social Work, 1975, v. 20, n. 1, p. 15
- Kelley, Verne R.;
- Weston, Hanna B.
- Article
13
- Society, 1998, v. 35, n. 4, p. 28, doi. 10.1007/BF02686379
- Article
15
- Indexer, 2016, v. 34, n. 3, p. 126, doi. 10.3828/indexer.2016.39
- Article
16
- Records Management Quarterly (1986), 1995, v. 29, n. 3, p. 16
- Morgan, Owen J.;
- Welch, Miranda
- Article
17
- Journal of Consumer Satisfaction, Dissatisfaction & Complaining Behavior, 2012, v. 25, p. 179
- Article
18
- Delta Pi Epsilon Journal, 2006, v. 48, n. 1, p. 19
- Article
19
- Journal of Computer-Mediated Communication, 2011, v. 16, n. 2, p. 250, doi. 10.1111/j.1083-6101.2011.01538.x
- Cho, Vincent;
- Hung, Humphry
- Article
20
- Journal of Computer-Mediated Communication, 2007, v. 12, n. 2, p. 378, doi. 10.1111/j.1083-6101.2007.00346.x
- Walsh, John P.;
- Maloney, Nancy G.
- Article
22
- Electronics Systems & Software, 2006, v. 4, n. 1, p. 10, doi. 10.1049/ess:20060101
- Article
23
- Computing & Control Engineering, 2006, v. 17, n. 2, p. 12, doi. 10.1049/cce:20060201
- Article
24
- Computing & Control Engineering, 2004, v. 15, n. 1, p. 2
- Article
25
- Computing & Control Engineering, 2003, v. 14, n. 5, p. 2
- Article
26
- Computing & Control Engineering, 2003, v. 14, n. 5, p. 4
- Article
27
- Professional Safety, 2014, v. 59, n. 5, p. 72
- Article
28
- Journal of Correctional Education, 2001, v. 52, n. 4, p. 163
- McIntyre, Tom;
- Tong, Virginia M.;
- Perez, Joseph F.
- Article
29
- International Insolvency Review, 1998, v. 7, n. 3, p. 193, doi. 10.1002/iir.3940070304
- Article
30
- Distributed Computing, 2017, v. 30, n. 3, p. 193, doi. 10.1007/s00446-016-0284-9
- Dani, Varsha;
- King, Valerie;
- Movahedi, Mahnush;
- Saia, Jared;
- Zamani, Mahdi
- Article
31
- International Journal of Image & Graphics, 2024, v. 24, n. 4, p. 1, doi. 10.1142/S0219467824500487
- Lavanya, V.;
- Sekhar, P. Chandra
- Article
32
- International Journal of Image & Graphics, 2007, v. 7, n. 3, p. 481, doi. 10.1142/S0219467807002787
- Article
33
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 167, doi. 10.1142/S0219467805001719
- Article
35
- Fluctuation & Noise Letters, 2016, v. 15, n. 1, p. -1, doi. 10.1142/S0219477516500085
- Gonzalez, Elias;
- Kish, Laszlo B.
- Article
36
- Network (2673-8732), 2023, v. 3, n. 1, p. 115, doi. 10.3390/network3010006
- Adhikari, Naresh;
- Ramkumar, Mahalingam
- Article
37
- Software (2674-113X), 2023, v. 2, n. 2, p. 197, doi. 10.3390/software2020009
- Mutanu, Leah;
- Gohil, Jeet;
- Gupta, Khushi
- Article
38
- Software (2674-113X), 2023, v. 2, n. 2, p. 276, doi. 10.3390/software2020013
- Koga, Harumichi;
- Taki, Katsuhiko;
- Masugi, Ayano
- Article
39
- Software (2674-113X), 2023, v. 2, n. 2, p. 258, doi. 10.3390/software2020012
- Murphy, Anthony B.;
- Thomas, David G.;
- Chen, Fiona F.;
- Xiang, Junting;
- Feng, Yuqing
- Article
40
- Software (2674-113X), 2023, v. 2, n. 2, p. 234, doi. 10.3390/software2020011
- Huss, Moe;
- Herber, Daniel R.;
- Borky, John M.
- Article
41
- Software (2674-113X), 2023, v. 2, n. 2, p. 218, doi. 10.3390/software2020010
- Schuler, Andreas H.;
- Praschl, Christoph;
- Pointner, Andreas
- Article
42
- Software (2674-113X), 2023, v. 2, n. 2, p. 292, doi. 10.3390/software2020014
- Lukyanchikova, Elena;
- Askarbekuly, Nursultan;
- Aslam, Hamna;
- Mazzara, Manuel
- Article
43
- Software (2674-113X), 2023, v. 2, n. 2, p. 177, doi. 10.3390/software2020008
- Article
44
- Software (2674-113X), 2023, v. 2, n. 2, p. 163, doi. 10.3390/software2020007
- Ulybyshev, Denis;
- Rogers, Michael;
- Kholodilo, Vadim;
- Northern, Bradley
- Article
45
- Marketing Research, 2000, v. 12, n. 3, p. 39
- Article
46
- Marketing Research, 1997, v. 9, n. 3, p. 37
- Article
47
- Journal of Fuzzy Extension & Applications (JFEA), 2024, v. 5, p. 74, doi. 10.22105/jfea.2024.468210.1552
- Diego Pablo, Palma Rivera;
- Silvio Amable, Machuca Vivar;
- Bolivar Enrique, Villalta Jadan;
- Misael Abisai, Valarezo Bracho
- Article
48
- IET Intelligent Transport Systems (Wiley-Blackwell), 2019, v. 13, n. 5, p. 780, doi. 10.1049/iet-its.2018.5117
- Arshad, Muhammad;
- Ullah, Zahid;
- Khalid, Muhammad;
- Ahmad, Naveed;
- Khalid, Waqar;
- Shahwar, Duri;
- Cao, Yue
- Article
49
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 5, p. 351, doi. 10.1049/ise2.12031
- Chen, Ming;
- Chen, Jing;
- Wei, Xianglin;
- Chen, Bing
- Article
50
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 5, p. 375, doi. 10.1049/ise2.12029
- Jabeen, Farhana;
- Khan, Zia‐ur‐Rehman;
- Hamid, Zara;
- Rehman, Zobia;
- Khan, Abid
- Article