Works matching Information assurance (IA)
1
- Journal of Telecommunications Management, 2009, v. 2, n. 3, p. 284
- Article
2
- Information Systems Frontiers, 2017, v. 19, n. 3, p. 509, doi. 10.1007/s10796-015-9608-8
- Burns, A.;
- Posey, Clay;
- Courtney, James;
- Roberts, Tom;
- Nanayakkara, Prabhashi
- Article
3
- International Journal of Information & Communication Technology Education, 2012, v. 8, n. 2, p. 94, doi. 10.4018/jicte.2012040108
- Agamba, Joachim;
- Keengwe, Jared
- Article
4
- IT Professional, 2008, v. 10, n. 3, p. 10, doi. 10.1109/MITP.2008.50
- Voas, Jeffrey;
- Wilbanks, Linda
- Article
5
- Information & Security, 2017, v. 36, n. 1, p. 1, doi. 10.11610/isij.3604
- SADIKU, Matthew N. O.;
- ALAM, Shumon;
- MUSA, Sarhan M.
- Article
6
- Business Education Innovation Journal, 2009, v. 1, n. 2, p. 68
- Article
7
- Norwich University Journal of Information Assurance (NUJIA), 2006, v. 2, n. 1, p. 1
- Article
8
- Information Systems Management, 2005, v. 22, n. 2, p. 20, doi. 10.1201/1078/45099.22.2.20050301/87274.3
- Ezingeard, Jean-Noël;
- McFadzean, Elspeth;
- Birchall, David
- Article
9
- Journal of Information Assurance & Security, 2013, v. 8, n. 1, p. 9
- Article
10
- Journal of Information Assurance & Security, 2013, v. 8, n. 1, p. 1
- Article
11
- Journal of Science Education & Technology, 2014, v. 23, n. 3, p. 370, doi. 10.1007/s10956-013-9469-1
- Xie, Yichun;
- Reider, David
- Article
12
- Journal of Educational Technology Systems, 2012, v. 41, n. 2, p. 107, doi. 10.2190/ET.41.2.b
- Adamo-Villani, Nicoletta;
- Oania, Marcus;
- Cooper, Stephen
- Article
13
- Journal of Homeland Security & Emergency Management, 2006, v. 3, n. 4, p. 1, doi. 10.2202/1547-7355.1281
- Chittister, Clyde G.;
- Haimes, Yacov Y.
- Article
14
- i-Manager's Journal on Software Engineering, 2022, v. 16, n. 3, p. 60, doi. 10.26634/jse.16.3.18674
- Article
15
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-94551-8
- Leiva-Araos, Andrés;
- Gana, Bady;
- Allende-Cid, Héctor;
- García, José;
- Saikia, Manob Jyoti
- Article
16
- Journal of Information Systems Education, 2017, v. 28, n. 1, p. 11
- Xiaohong Yuan;
- Williams, Kenneth;
- Huiming Yu;
- Rorrer, Audrey;
- Bei-Tseng Chu;
- Li Yang;
- Winters, Kathy;
- Kizza, Joseph
- Article
17
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 5, p. 253, doi. 10.1080/19393555.2010.514650
- Ting, WendyW.;
- Comings, DavidR.
- Article
18
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 139
- Article
19
- Forensic Examiner, 2005, v. 14, n. 2, p. 33
- Article
20
- Computer Journal, 2014, v. 57, n. 6, p. 840, doi. 10.1093/comjnl/bxt064
- Mostafa, Hala;
- Pal, Partha;
- Hurley, Patrick
- Article
21
- ITEA Journal of Test & Evaluation, 2010, v. 31, n. 4, p. 473
- Powell, Robert;
- Holmes, Timothy K.;
- Pie, Cesar E.
- Article
22
- ITEA Journal of Test & Evaluation, 2010, v. 31, n. 4, p. 466
- Christensen, Peter H.;
- May, Susan;
- Rachamadugu, Vijay;
- Smith, Robert K.
- Article
23
- ITNOW, 2012, v. 54, n. 1, p. 16, doi. 10.1093/itnow/bws005
- Neville-Jones, Baroness;
- Ensor, Chris;
- Westmacott, Mike
- Article
24
- International Journal of Communication Systems, 2025, v. 38, n. 1, p. 1, doi. 10.1002/dac.5492
- Thi Tam, Dinh;
- Cao Nguyen, Ba;
- Manh Hoang, Tran;
- The Dung, Le;
- Vinh, Nguyen Van;
- Kim, Taejoon;
- Lee, Wonseok
- Article
25
- International Journal of Communication Systems, 2024, v. 37, n. 7, p. 1, doi. 10.1002/dac.5734
- Article
26
- International Journal of Communication Systems, 2023, v. 36, n. 18, p. 1, doi. 10.1002/dac.5614
- Article
27
- Wireless Networks (10220038), 2025, v. 31, n. 1, p. 185, doi. 10.1007/s11276-024-03754-w
- Article
28
- Wireless Networks (10220038), 2024, v. 30, n. 2, p. 649, doi. 10.1007/s11276-023-03490-7
- Nguyen, Tan N.;
- Vinh, Nguyen Van;
- Nguyen, Ba Cao;
- Minh, Bui Vu
- Article
29
- ETRI Journal, 2025, v. 47, n. 2, p. 193, doi. 10.4218/etrij.2023-0456
- Article