Found: 5
Select item for more details and to access through your institution.
Vulnerabilities detection using attack recognition technique in multi-factor authentication.
- Published in:
- Telkomnika, 2020, v. 18, n. 4, p. 1998, doi. 10.12928/TELKOMNIKA.v18i4.14898
- By:
- Publication type:
- Article
Healthcare practitioner behaviours that influence unsafe use of hospital information systems.
- Published in:
- Health Informatics Journal, 2020, v. 26, n. 1, p. 420, doi. 10.1177/1460458219833090
- By:
- Publication type:
- Article
Socio-technical factors influencing big data analytics adoption in healthcare.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 4, p. 4745, doi. 10.11591/ijece.v14i4.pp4745-4758
- By:
- Publication type:
- Article
Security and Privacy Challenges of Big Data Adoption: A Qualitative Study in Telecommunication Industry.
- Published in:
- International Journal of Interactive Mobile Technologies, 2022, v. 16, n. 19, p. 81, doi. 10.3991/ijim.v16i19.32093
- By:
- Publication type:
- Article
A Scenario CTF-Based Approach in Cybersecurity Education for Secondary School Students.
- Published in:
- Electronic Journal of Computer Science & Information Technology, 2021, v. 7, n. 1, p. 1
- By:
- Publication type:
- Article