Works matching DE "CELL phone security measures"
1
- IT Professional, 2012, v. 14, n. 5, p. 28, doi. 10.1109/MITP.2012.72
- Jain, Anurag Kumar;
- Shanbhag, Devendra
- Article
2
- ComputerWorld Hong Kong, 2015, p. 20
- Article
3
- Professional Safety, 2016, v. 61, n. 12, p. 30
- Article
4
- Electrica, 2020, v. 20, n. 2, p. 143, doi. 10.5152/electrica.2020.20030
- Akman, Vefak Murat;
- Vural, Revna Acar;
- Koç, Kemal Talha
- Article
5
- International Journal of Information Security Science, 2016, v. 5, n. 4, p. 106
- Canbek, Gürol;
- Sagiroglu, Seref;
- Baykal, Nazife
- Article
6
- International Journal of Information Security Science, 2016, v. 5, n. 4, p. 82
- Taş, Ruhi;
- Tanrıöver, Özgür
- Article
7
- Brigham Young University Law Review, 2021, v. 2021, n. 2, p. 601
- Article
8
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 6, p. 125
- Jadhav, Meera;
- Anuradha, U.;
- Bilwashree, H.;
- Vani, B.
- Article
9
- International Journal of Software Engineering & Knowledge Engineering, 2014, v. 24, n. 7, p. 981, doi. 10.1142/S0218194014020021
- Haiping Xu;
- Gao, Jerry;
- Bai, Yan;
- Roussos, George
- Article
10
- ICTACT Journal on Communication Technology, 2016, v. 7, n. 3, p. 1373
- Shah, Ronak;
- Patil, Kailas
- Article
11
- Journal of Information Processing Systems, 2013, v. 9, n. 2, p. 333, doi. 10.3745/JIPS.2013.9.2.333
- Thang Hoang;
- Thuc Nguyen;
- Chuyen Luong;
- Son Do;
- Deokjai Choi
- Article
12
- International Journal of Cyber Criminology, 2009, v. 3, n. 2, p. 536
- Adetula, G. A.;
- Fagbohunka, A.
- Article
13
- Journal of Education & Science, 2022, v. 31, n. 2, p. 94, doi. 10.33899/edusj.2022.133190.1222
- Ahmed, Anfal Mahmood;
- Nori, Ahmed Sami
- Article
14
- International Journal on Information Technologies & Security, 2016, v. 8, n. 4, p. 25
- Albahar, Marwan Ali;
- Haataja, Keijo;
- Toivanen, Pekka
- Article
15
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 205
- Schwamm, Riqui;
- Rowe, Neil C.
- Article
16
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 221
- Anobah, Maxwell;
- Saleem, Shahzad;
- Popov, Oliver
- Article
17
- Journal of the Missouri Bar, 2022, v. 78, n. 3, p. 117
- Article
18
- Wireless Personal Communications, 2015, v. 84, n. 4, p. 2493, doi. 10.1007/s11277-015-2716-4
- Article
19
- Erzincan University Journal of Science & Technology, 2021, v. 14, n. 1, p. 331, doi. 10.18185/erzifbed.806683
- Article
20
- ISSA Journal, 2016, v. 14, n. 3, p. 5
- Article
21
- Electronics (2079-9292), 2017, v. 6, n. 1, p. 17, doi. 10.3390/electronics6010017
- De Angelis, Francesco Luca;
- Di Marzo Serugendo, Giovanna
- Article
22
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2016, v. 20, n. 5, p. 1735, doi. 10.1007/s00500-015-1703-8
- Tang, Feilong;
- Li, Jie;
- You, Ilsun;
- Guo, Minyi
- Article
23
- George Washington Law Review, 2017, v. 85, n. 2, p. 566
- Article
24
- Journal of the California Dental Association, 2018, v. 46, n. 9, p. 598
- Article
25
- Computer Law Review International, 2018, v. 19, n. 6, p. 178, doi. 10.9785/cri-2018-190604
- Fernandez, Diego;
- O'Farrell, Inés
- Article
26
- Informatica Economica, 2009, v. 13, n. 1, p. 57
- Article
27
- Annals of DAAAM & Proceedings, 2015, v. 26, n. 1, p. 0075, doi. 10.2507/26th.daaam.proceedings.011
- Adamek, Milan;
- Neumann, Petr;
- Pospisilik, Martin;
- Matysek, Miroslav
- Article
28
- International Journal of Electronics & Telecommunications, 2015, v. 61, n. 4, p. 311, doi. 10.1515/eletel-2015-0040
- Cotterell, Kathryn;
- Welch, Ian;
- Chen, Aaron
- Article
29
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/929380
- Park, Su-Wan;
- Lim, JaeDeok;
- Kim, Jeong Nyeo
- Article
30
- PLoS ONE, 2015, v. 10, n. 11, p. 1, doi. 10.1371/journal.pone.0142716
- Alizadeh, Mojtaba;
- Zamani, Mazdak;
- Baharun, Sabariah;
- Abdul Manaf, Azizah;
- Sakurai, Kouichi;
- Anada, Hiroki;
- Keshavarz, Hassan;
- Ashraf Chaudhry, Shehzad;
- Khurram Khan, Muhammad
- Article
31
- Northwestern University Law Review, 2017, v. 111, n. 2, p. 517
- Article
32
- IT Professional, 2009, v. 11, n. 1, p. 9
- Article
33
- Wake Forest Law Review, 2024, v. 59, n. 1, p. 269
- Article
34
- International Journal of Information Security, 2014, v. 13, n. 6, p. 513, doi. 10.1007/s10207-014-0231-3
- Lee, Ming-Feng;
- Smart, Nigel;
- Warinschi, Bogdan;
- Watson, Gaven
- Article
35
- eLearning & Software for Education, 2018, v. 4, p. 11, doi. 10.12753/2066-026X-18-215
- BĂRBIERU, Dragoș;
- STOICA, Alexandru
- Article
36
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2674, doi. 10.1002/sec.1265
- Chang, Ting-Yi;
- Tsai, Cheng-Jung;
- Tsai, Wang-Jui;
- Peng, Chun-Cheng;
- Wu, Han-Sing
- Article
37
- Security & Communication Networks, 2015, v. 8, n. 3, p. 446, doi. 10.1002/sec.992
- Zhao, Kao;
- Jin, Hai;
- Zou, Deqing;
- Dai, Weiqi;
- Xiang, Yang
- Article
38
- National Social Science Journal, 2017, v. 48, n. 2, p. 9
- Burum, Sue;
- Holmes, Georgia
- Article
39
- American Journal of Trial Advocacy, 2010, v. 34, n. 1, p. 165
- Article
40
- Loyola Law Review, 2020, v. 66, n. 1, p. 183
- Article
41
- CounterPunch, 2021, p. 1
- Article
42
- In These Times, 2015, v. 39, n. 5, p. 6
- Article