Works matching DE "WEBSITE security"
1
- Journal of Natural Sciences & Mathematics (JNSM), 2024, v. 9, n. 17/18, p. 294, doi. 10.62792/ut.jnsm.v9.i17-18.p2824
- BAJRAMI, Enes;
- IDRIZI, Florim;
- RUSHITI, Agim
- Article
2
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 5, p. 711
- Hooda, Anita;
- Malhotra, Rupali
- Article
3
- Financial Executive, 2001, v. 17, n. 2, p. 10
- Article
4
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 4502
- Chandrika, Terupally;
- swetha, Rapole;
- Jyothi, Pokala;
- Kumar, P. Prashanth
- Article
5
- Computers, Materials & Continua, 2025, v. 83, n. 1, p. 115, doi. 10.32604/cmc.2025.062729
- Derea, Zaid;
- Zou, Beiji;
- Kui, Xiaoyan;
- Abdullah, Monir;
- Thobhani, Alaa;
- Abdussalam, Amr
- Article
6
- Information Systems Frontiers, 2022, v. 24, n. 5, p. 1667, doi. 10.1007/s10796-021-10170-4
- Zhao, Yang;
- Li, Yixuan;
- Wang, Ning;
- Zhou, Ruoxin;
- Luo, Xin
- Article
7
- Journal of the Australian Traditional Medicine Society, 2010, v. 16, n. 1, p. 23
- Article
8
- International Journal of Human-Computer Interaction, 2008, v. 24, n. 3, p. 307, doi. 10.1080/10447310801937999
- Proctor, RobertW.;
- Ali, M. Athar;
- Vu, Kim-PhuongL.
- Article
9
- International Journal of Web Services Research, 2010, v. 7, n. 1, p. 1, doi. 10.4018/jwsr.2010010101
- Wei She;
- I-Ling Yen;
- Thuraisingham, Bhavani
- Article
10
- Social Behavior & Personality: an international journal, 2015, v. 43, n. 5, p. 729, doi. 10.2224/sbp.2015.43.5.729
- SEUNGSIN LEE;
- YOUNGHEE LEE;
- JOING-IN LEE;
- JUNGKUN PARK
- Article
11
- Journal of Counterterrorism & Homeland Security International, 2016, v. 22, n. 1, p. 8
- Article
12
- Journal of Counterterrorism & Homeland Security International, 2011, v. 17, n. 1, p. 6
- Article
13
- Journal of Research & Practice in Information Technology, 2014, v. 46, n. 1, p. 19
- Kumar, Rakesh;
- Kaur, Gurvinder
- Article
14
- Iraqi Journal of Science, 2021, p. 174, doi. 10.24996/ijs.2021.SI.1.24
- Abdulkadhim, Mustafa;
- Hasan, Sami
- Article
15
- Internal Auditor, 2010, v. 67, n. 6, p. 16
- Article
16
- Journal of Qadisiyah Computer Science & Mathematics, 2018, v. 10, n. 3, p. 9, doi. 10.29304/jqcm.2018.10.3.413
- Article
17
- BVICAM's International Journal of Information Technology, 2016, v. 8, n. 1, p. 922
- Jagadamba, G.;
- Sathish Babu, B.
- Article
18
- Library Philosophy & Practice, 2016, p. 1
- Article
19
- Journal of Information & Knowledge Management, 2017, v. 16, n. 4, p. -1, doi. 10.1142/S0219649217500344
- Thabtah, Fadi;
- Kamalov, Firuz
- Article
20
- InfoM, 2010, n. 34, p. 42
- Joldžić, Ognjen;
- Đurić, Zoran
- Article
21
- IETE Journal of Research, 2011, v. 57, n. 5, p. 413, doi. 10.4103/0377-2063.90150
- Singh, Brijendra;
- Agarwal, Pooja
- Article
22
- e-Journal of Science & Technology, 2013, v. 8, n. 4, p. 1
- Xydas;
- Miaoulis, G.;
- Bonnefoi, P. F.;
- Plemenos, D.;
- Ghazanfarpour, D.
- Article
23
- International Journal of Interactive Mobile Technologies, 2024, v. 18, n. 19, p. 171, doi. 10.3991/ijim.v18i19.49437
- Navaneethan, S.;
- Kumar, S. Udhaya
- Article
24
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2633, doi. 10.23940/ijpe.18.11.p9.26332642
- Article
25
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2008, v. 23, n. 2, p. 507
- Vural, Yılmaz;
- Sağıroğlu, Şeref
- Article
26
- Marketing Health Services, 2014, v. 34, n. 4, p. 5
- Article
27
- Journal of the Bromeliad Society, 2014, v. 64, n. 4, p. 238
- Article
28
- Nature, 2013, v. 504, n. 7480, p. 333, doi. 10.1038/504333a
- Article
29
- Applied Sciences (2076-3417), 2024, v. 14, n. 1, p. 42, doi. 10.3390/app14010042
- Article
30
- Applied Sciences (2076-3417), 2023, v. 13, n. 17, p. 9703, doi. 10.3390/app13179703
- Alotaibi, Fahad Mazaed;
- Al-Dhaqm, Arafat;
- Yafooz, Wael M. S.;
- Al-Otaibi, Yasser D.
- Article
31
- International Journal on Information Sciences & Computing, 2016, v. 10, n. 1, p. 11, doi. 10.18000/ijisac.50158
- Kumar, M. Ashok;
- Mayan, J. Albert
- Article
32
- Journal of Corporate Accounting & Finance (Wiley), 2002, v. 13, n. 5, p. 39, doi. 10.1002/jcaf.10084
- Schroeder, Chris;
- Smith, Gordon
- Article
33
- i-Manager's Journal on Software Engineering, 2020, v. 14, n. 3, p. 37, doi. 10.26634/jse.14.3.17360
- YADAV, AJIT;
- YADAV, RAHUL;
- TIWARI, MANGESH
- Article
34
- Majlesi Journal of Electrical Engineering, 2010, v. 4, n. 2, p. 43
- Jer Lang Hong;
- Fauzi, Fariza
- Article
35
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2009, v. 44, n. 1, p. 21
- Article
36
- Fraser Forum, 2008, p. 12
- Article
37
- Journal of the Association for Information Systems, 2015, v. 16, n. 6, p. 448
- Zahedi, Fatemeh Mariam;
- Abbasi, Ahmed;
- Yan Chen
- Article
38
- Journal of Management Information Systems, 2002, v. 19, n. 1, p. 211, doi. 10.1080/07421222.2002.11045715
- Article
39
- Journal of Broadcasting & Electronic Media, 2018, v. 62, n. 3, p. 461, doi. 10.1080/08838151.2018.1451867
- Turow, Joseph;
- Hennessy, Michael;
- Draper, Nora
- Article
40
- Journal of the American Medical Informatics Association, 2008, v. 15, n. 5, p. 601, doi. 10.1197/jamia.M2702
- FRIEDLIN, F. JEFF;
- MCDONALD, CLEMENT J.
- Article
41
- Applied Artificial Intelligence, 2009, v. 23, n. 10, p. 945, doi. 10.1080/08839510903208088
- Khakpour, Narges;
- Jalili, Saeed
- Article
42
- Informatica Economica, 2010, v. 14, n. 2, p. 27
- Lungu, Ion;
- Tӑbuşcӑ, Alexandru
- Article
43
- Information Security Journal: A Global Perspective, 2009, v. 18, n. 4, p. 170, doi. 10.1080/19393550903074127
- Article
44
- Strategic Finance, 2003, v. 85, n. 3, p. 59
- Article
45
- Journal of Network & Systems Management, 2019, v. 27, n. 2, p. 289, doi. 10.1007/s10922-018-9466-z
- Jahani, Hojjat;
- Jalili, Saeed
- Article
46
- Public Relations Tactics, 2000, v. 7, n. 4, p. 5
- Elsasser, John;
- Reese, Jeff
- Article
47
- Jurnal Manajemen Teori dan Terapan, 2022, v. 15, n. 3, p. 330, doi. 10.20473/jmtt.v15i3.40294
- Wan Jusoh, Wan Amiera Binti;
- Bin Sjahrir, Muhammad Ilham;
- Binti Hussin, Nur Fatihah Shuhada;
- Ishar, Nor Irvoni Mohd
- Article
48
- Techno.com, 2023, v. 22, n. 2, p. 418, doi. 10.33633/tc.v22i2.7562
- Ariyadi, Tamsir;
- Widodo, Tantri Langgeng;
- Apriyanti, Nely;
- Kirana, Febriani Sasti
- Article
49
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4315829
- Pu, Ao;
- Feng, Xia;
- Zhang, Yuhan;
- Wan, Xuelin;
- Han, Jiaxuan;
- Huang, Cheng
- Article
50
- International Journal of Foundations of Computer Science, 2009, v. 20, n. 4, p. 597, doi. 10.1142/S0129054109006760
- DIXON, RYAN;
- EĞECIOĞLU, ÖMER;
- SHERWOOD, TIMOTHY
- Article