Works matching DE "COMPUTER security standards"
1
- ISSA Journal, 2017, v. 15, n. 7, p. 14
- Article
2
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 22, doi. 10.26636/jtit.2011.1.1130
- Flizikowski, Adam;
- Majewski, Mateusz;
- Hołubowicz, Maria;
- Kowalczyk, Zbigniew;
- Romano, Simon Pietro
- Article
3
- Electronics Letters (Wiley-Blackwell), 2021, v. 57, n. 13, p. 511, doi. 10.1049/ell2.12188
- Jiang, Huilong;
- Zhu, Xiang;
- Pang, Jinfeng;
- Liu, Zhipeng;
- Han, Jianwei;
- Li, Yue
- Article
4
- Kirkuk University Journal for Scientific Studies, 2018, v. 13, n. 3, p. 64, doi. 10.32894/kujss.2018.13.3.6
- Article
5
- Advances in Electrical & Electronic Engineering, 2017, v. 15, n. 4, p. 626, doi. 10.15598/aeee.v15i4.2467
- KVARDA, Lukas;
- HNYK, Pavel;
- VOJTECH, Lukas;
- NERUDA, Marek
- Article
6
- Computer Journal, 2017, v. 60, n. 4, p. 573, doi. 10.1093/comjnl/bxw081
- YILDIZ, MUHAMMET;
- YANIKOĞLU, BERRIN;
- KHOLMATOV, ALISHER;
- KANAK, ALPER;
- ULUDAĞ, UMUT;
- ERDOĞAN, HAKAN
- Article
7
- Computer Journal, 2017, v. 60, n. 4, p. 555, doi. 10.1093/comjnl/bxw072
- İSLAM TATLI, EMİN;
- URGUN, BEDİRHAN
- Article
8
- Computer Journal, 2017, v. 60, n. 4, p. 541, doi. 10.1093/comjnl/bxw070
- LEYOU ZHANG;
- JINGXIA ZHANG;
- YI MU
- Article
9
- Computer Journal, 2017, v. 60, n. 4, p. 527, doi. 10.1093/comjnl/bxw066
- RADKE, KENNETH;
- BOYD, COLIN
- Article
10
- Computer Journal, 2017, v. 60, n. 4, p. 507, doi. 10.1093/comjnl/bxw061
- JING LIU;
- YUNYUN WU;
- XUEZHENG LIU;
- YUNCHUN ZHANG;
- GANG XUE;
- WEI ZHOU;
- SHAOWEN YAO
- Article
11
- Computer Journal, 2017, v. 60, n. 4, p. 497, doi. 10.1093/comjnl/bxw060
- Article
12
- Computer Journal, 2017, v. 60, n. 4, p. 491, doi. 10.1093/comjnl/bxw058
- XI-JUN LIN;
- LIN SUN;
- HAIPENG QU;
- XIAOSHUAI ZHANG
- Article
13
- International Journal of Performability Engineering, 2018, v. 14, n. 8, p. 1804, doi. 10.23940/ijpe.18.08.p17.18041814
- Xuncai Zhang;
- Zheng Zhou;
- Yishan Liu;
- Guangzhao Cui;
- Ying Niu;
- Yanfeng Wang
- Article
14
- Issues in Informing Science & Information Technology, 2012, v. 9, p. 331
- Talib, Manar Abu;
- Khelifi, Adel;
- Barachi, May El;
- Ormandjieva, Olga
- Article
15
- Requirements Engineering, 2006, v. 11, n. 2, p. 138, doi. 10.1007/s00766-005-0023-4
- Haley, Charles;
- Laney, Robin;
- Moffett, Jonathan;
- Nuseibeh, Bashar
- Article
16
- International Journal of Parallel Programming, 2016, v. 44, n. 6, p. 1102, doi. 10.1007/s10766-016-0408-7
- Nedjah, Nadia;
- Macedo Mourelle, Luiza;
- Wang, Chao
- Article
17
- Postgraduate Medicine, 2000, v. 108, n. 6, p. 40
- Article
18
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 5, p. 1488, doi. 10.3969/j.issn.1001-3695.2014.05.049
- PAN Ning;
- ZHU Zhi-qiang;
- SUN Lei;
- ZHAO Zhi-yuan
- Article
19
- Visión Electrónica, 2014, v. 8, n. 1, p. 186
- Barrero Páez, Luís Efrén;
- Díaz, Andrés Escobar;
- González, Harold Vacca
- Article
20
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/391986
- Saewoom Lee;
- Youngtae Noh;
- Kiseon Kim
- Article
21
- International Journal of Software Engineering & Knowledge Engineering, 2012, v. 22, n. 1, p. 59, doi. 10.1142/S0218194012500039
- CHEN, JINFU;
- LU, YANSHENG;
- WANG, HUANHUAN
- Article
22
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 4, p. 379, doi. 10.1142/S012905411750023X
- Grigoriev, Dima;
- Kish, Laszlo B.;
- Shpilrain, Vladimir
- Article
23
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 133, doi. 10.1109/TSE.2007.70754
- Haley, Charles B.;
- Laney, Robin;
- Moffett, Jonathan D.;
- Nuseibeh, Bashar
- Article
24
- Journal of Information Assurance & Security, 2012, v. 7, n. 2, p. 102
- Tawalbeh, Lo'ai;
- Al-Hajsalem, Hend;
- Abu-Qtaish, Tasneem;
- Khatatbeh, Ayat
- Article
25
- Journal of Information System Security, 2014, v. 10, n. 2, p. 59
- Article
26
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1655, doi. 10.1007/s11277-016-3873-9
- Ghilen, Aymen;
- Azizi, Mostafa;
- Bouallegue, Ridha
- Article
27
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 979, doi. 10.1007/s11277-013-1547-4
- Hsieh, Wen-Bin;
- Leu, Jenq-Shiou
- Article
28
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 7, p. 205
- Article
29
- Multimedia Tools & Applications, 2015, v. 74, n. 1, p. 303, doi. 10.1007/s11042-014-1870-0
- Yoo, Hyunguk;
- Shon, Taeshik
- Article
30
- International Journal of Information Security, 2014, v. 13, n. 1, p. 25, doi. 10.1007/s10207-013-0218-5
- Manulis, Mark;
- Poettering, Bertram;
- Stebila, Douglas
- Article
31
- Business Lawyer, 2005, v. 61, n. 1, p. 471
- Trope, Roland L.;
- Power, E. Michael
- Article
32
- IAENG International Journal of Computer Science, 2015, v. 42, n. 2, p. 125
- Xiaoqiang ZHANG;
- Ning WU;
- Gaizhen YAN;
- Liling DONG
- Article
33
- Cryptologia, 2014, v. 38, n. 4, p. 348, doi. 10.1080/01611194.2014.915706
- Article
34
- Cryptologia, 2012, v. 36, n. 1, p. 70, doi. 10.1080/01611194.2012.635115
- Ball, Matthew V.;
- Guyot, Cyril;
- Hughes, James P.;
- Martin, Luther;
- Noll, Landon Curt
- Article
35
- Defence S&T Technical Bulletin, 2015, v. 8, n. 1, p. 76
- Nabila Komori, Nur Izyan;
- Ali, Mohamad Ismail
- Article