Works matching DE "INFORMATION network security"
1
- ISSA Journal, 2018, v. 16, n. 7, p. 37
- Article
2
- Financial Executive, 2005, v. 21, n. 5, p. 11
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
3
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0077-8
- Chopra, Khyati;
- Bose, Ranjan;
- Joshi, Anupam
- Article
4
- Strategic Finance, 2005, v. 86, n. 7, p. 49
- Article
5
- Journal of Internet Computing & Services, 2025, v. 26, n. 1, p. 93, doi. 10.7472/jksii.2025.26.1.93
- Article
6
- Quality - Access to Success, 2019, v. 20, p. 322
- IONESCU, Razvan Cristian;
- GRAB, Benjamin;
- HASSANI, Youssef
- Article
7
- International Journal of Network Management, 2016, v. 26, n. 6, p. 461, doi. 10.1002/nem.1945
- Article
8
- ASHRAE Transactions, 2006, v. 112, n. 2, p. 671
- Lathrop, Scott D.;
- Gates, Christopher L.;
- Massie, Darrell D.
- Article
9
- Security & Communication Networks, 2015, v. 8, n. 6, p. 1040, doi. 10.1002/sec.1058
- Erfani, Seyed Hossein;
- Javadi, Hamid H.S.;
- Rahmani, Amir Masoud
- Article
11
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2728, doi. 10.1002/sec.795
- Ziegeldorf, Jan Henrik;
- Morchon, Oscar Garcia;
- Wehrle, Klaus
- Article
12
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1622, doi. 10.1002/sec.814
- Kim, Yanghoon;
- Chang, Hangbae
- Article
13
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1552, doi. 10.1002/sec.768
- Li, Xiangxue;
- Qian, Haifeng;
- Yu, Yu;
- Weng, Jian;
- Wang, Ziping
- Article
14
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6497, doi. 10.1007/s11042-014-2096-x
- Kang, Sunyoung;
- Kim, Hyuncheol;
- Kang, Seungae
- Article
15
- Naval Research Logistics, 2009, v. 56, n. 7, p. 625, doi. 10.1002/nav.20365
- Schavland, Jeffrey;
- Chan, Yupo;
- Raines, Richard A.
- Article
16
- Systems Engineering, 2013, v. 16, n. 3, p. 313, doi. 10.1002/sys.21236
- Garvey, Paul R.;
- Moynihan, Richard A.;
- Servi, Les
- Article
17
- Journal of Information System Security, 2009, v. 5, n. 2, p. 26
- Luse, Andy;
- Scheibe, Kevin P.;
- Townsend, Anthony M.
- Article
18
- Journal of Information System Security, 2009, v. 5, n. 2, p. 42
- Goodall, John R.;
- Lutters, Wayne G.;
- Komlodi, Anita
- Article
19
- Information Knowledge Systems Management, 2008, v. 7, n. 1/2, p. 121, doi. 10.3233/iks-2008-00111
- Tarasewich, Peter;
- Gong, Jun;
- Fiona Fui-Hoon Nah;
- DeWester, David
- Article
20
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 549, doi. 10.1093/jigpal/jzs028
- Bankovic, Z.;
- Vallejo, J. C.;
- Fraga, D.;
- Moya, J. M.
- Article
22
- China Business Review, 2016, p. 1
- Article