Works matching Security systems industry
1
- Logistics (2305-6290), 2024, v. 8, n. 4, p. 98, doi. 10.3390/logistics8040098
- Chlomoudis, Constantinos;
- Kostagiolas, Petros;
- Pallis, Petros;
- Platias, Charalampos
- Article
2
- Ingénierie des Systèmes d'Information, 2023, v. 28, n. 3, p. 595, doi. 10.18280/isi.280307
- Todoshchuk, Andrew;
- Motorniuk, Uliana;
- Skliaruk, Tetiana;
- Oliinyk, Ihor;
- Kornieieva, Tetiana
- Article
3
- Issues in Ethnology Anthropology, 2014, v. 9, n. 1, p. 105
- Article
4
- Journal of Electrical & Computer Engineering, 2022, p. 1, doi. 10.1155/2022/8612174
- Wei, Zhenqiang;
- Dong, Shaohua;
- Wang, Xuchu
- Article
5
- Cotton Textile Technology, 2023, v. 51, n. 622, p. 33
- Article
7
- Applied Sciences (2076-3417), 2021, v. 11, n. 16, p. 7754, doi. 10.3390/app11167754
- Jung, Sung-Woon;
- Kwon, Hyuk-Ju;
- Lee, Sung-Hak
- Article
8
- Military Engineer / Hadmérnök, 2024, v. 19, n. 3, p. 137, doi. 10.32567/hm.2024.3.9
- Ottó, Ináncsi Mátyás;
- Máté, Dub
- Article
9
- Problems of Economy, 2021, v. 48, n. 3, p. 147, doi. 10.32983/2222-0712-2021-3-147-152
- Article
10
- Journal of Software: Evolution & Process, 2023, v. 35, n. 7, p. 1, doi. 10.1002/smr.2494
- Lampropoulos, Georgios;
- Siakas, Kerstin
- Article
11
- Processes, 2023, v. 11, n. 8, p. 2286, doi. 10.3390/pr11082286
- Hui, Xiangwei;
- Qi, Ming;
- Wang, Wenhao;
- Yang, Sen;
- Zhang, Chengqi
- Article
12
- Journal of Function Spaces, 2022, p. 1, doi. 10.1155/2022/8596540
- Yuan, Ling;
- Sun, Shan-Hui;
- Cai, Zheng-Qun
- Article
13
- Sustainability (2071-1050), 2021, v. 13, n. 19, p. 10693, doi. 10.3390/su131910693
- Ko, Young Dae;
- Song, Byung Duk
- Article
14
- Journal of Central China Normal University, 2023, v. 57, n. 1, p. 1, doi. 10.19603/j.cnki.1000-1190.2023.01.001
- Article
15
- Journal of Information Systems, 2006, v. 20, n. 1, p. 187, doi. 10.2308/jis.2006.20.1.187
- Article
16
- Wireless Networks (10220038), 2025, v. 31, n. 2, p. 983, doi. 10.1007/s11276-024-03770-w
- Yuman, Yang;
- Goyal, S. B.;
- Rajawat, Anand Singh;
- Kumar, Manoj;
- Shankar, Achyut;
- Alhayan, Fatimah;
- Basheer, Shakila
- Article
17
- Information (2078-2489), 2023, v. 14, n. 12, p. 666, doi. 10.3390/info14120666
- Article
18
- Homeland Defense Journal, 2007, v. 5, n. 10, p. 45
- Article
19
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 8
- Article
20
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 6
- Article
21
- Policy & Society, 2011, v. 30, n. 3, p. 221, doi. 10.1016/j.polsoc.2011.07.006
- Article
22
- Australian Journal of International Affairs, 2009, v. 63, n. 3, p. 390, doi. 10.1080/10357710903104851
- Article
23
- Advanced Functional Materials, 2014, v. 24, n. 22, p. 3299, doi. 10.1002/adfm.201303874
- Honda, Wataru;
- Harada, Shingo;
- Arie, Takayuki;
- Akita, Seiji;
- Takei, Kuniharu
- Article
24
- ISSA Journal, 2017, v. 15, n. 4, p. 16
- Article
25
- ISSA Journal, 2017, v. 15, n. 4, p. 9
- Article
26
- Overland, 2007, n. 188, p. 14
- Article
27
- Decision Sciences, 2001, v. 32, n. 4, p. 635, doi. 10.1111/j.1540-5915.2001.tb00975.x
- Dan Zhu;
- Premkumar, G.;
- Xiaoning Zhang;
- Chao-Hsien Chu
- Article
28
- Journal of Art Crime, 2011, n. 6, p. 126
- Article
29
- Electronics & Electrical Engineering, 2009, n. 96, p. 62
- Article
30
- Forensic Examiner, 2003, v. 12, n. 3/4, p. 26
- Article
31
- Debates IESA, 2013, v. 18, n. 4, p. 71
- Article
32
- Contemporary Security Policy, 2011, v. 32, n. 1, p. 215, doi. 10.1080/13523260.2011.556863
- Article
33
- Journal of Intelligent Information Systems, 2007, v. 28, n. 3, p. 199, doi. 10.1007/s10844-006-0008-x
- Spokoiny, Alex;
- Shahar, Yuval
- Article
34
- Quality & Reliability Engineering International, 2025, v. 41, n. 2, p. 897, doi. 10.1002/qre.3678
- Bairaktaris, Julius A.;
- Johannssen, Arne;
- Tran, Kim Phuc
- Article
35
- Personal & Ubiquitous Computing, 2003, v. 7, n. 1, p. 53, doi. 10.1007/s00779-002-0213-8
- Article
36
- Journal of Economic Sciences Institute, 2023, v. 26, n. 1, p. 151
- عمار بن سديرة;
- فتيحة بوحرود
- Article
37
- Journal of Cryptology, 2007, v. 20, n. 4, p. 431, doi. 10.1007/s00145-007-0567-1
- Kalai, Yael Tauman;
- Lindell, Yehuda;
- Prabhakaran, Manoj
- Article
38
- European Data Protection Law Review (EDPL), 2018, v. 4, n. 4, p. 296, doi. 10.21552/core/2018/4/10
- Møller, Marianne Henne;
- Klevstrand, Simen
- Article
39
- Internal Auditor, 2007, v. 64, n. 5, p. 15
- Article
40
- Telecommunication Systems, 2006, v. 31, n. 2/3, p. 213, doi. 10.1007/s11235-006-6521-y
- Alia Fourati;
- Khaldoun Agha
- Article
41
- Telecommunication Systems, 2006, v. 31, n. 1, p. 11, doi. 10.1007/s11235-006-5520-3
- Alan Robinson;
- Yupo Chan;
- Dennis Dietz
- Article
42
- Metalurgija, 2013, v. 52, n. 2, p. 271
- RANITOVIĆ, P.;
- TOT, I.;
- ĐOROVIĆ, B.;
- TEPIĆ, G.;
- TODIĆ, V. V.
- Article
43
- International Journal of Performability Engineering, 2009, v. 5, n. 5, p. 419
- Liudong Xingi;
- Haoli Li;
- Michel, Howard E.
- Article
44
- Continuum: Journal of Media & Cultural Studies, 2014, v. 28, n. 6, p. 808, doi. 10.1080/10304312.2014.966406
- Article
45
- SA Crime Quarterly, 2011, n. 38, p. 23
- BERG, JULIE;
- NOUVEAU, JEAN-PIERRE
- Article
46
- SA Crime Quarterly, 2011, n. 38, p. 1
- Article
47
- Surveillance & Society, 2016, v. 14, n. 1, p. 122, doi. 10.24908/ss.v14i1.6282
- Mateescu, Alexandra;
- Rosenblat, Alex;
- boyd, danah
- Article
48
- Surveillance & Society, 2016, v. 14, n. 1, p. 34, doi. 10.24908/ss.v14i1.5622
- Article
49
- Surveillance & Society, 2016, v. 14, n. 1, p. 59, doi. 10.24908/ss.v14i1.5488
- Article
50
- Surveillance & Society, 2016, v. 14, n. 1, p. 90, doi. 10.24908/ss.v14i1.5372
- Article