Works matching DE "COMMON Criteria for Information Technology Security Evaluation"
1
- China Terminology, 2021, v. 23, n. 4, p. 65, doi. 10.12339/j.issn.1673-8578.2021.04.010
- AN Xiaomi;
- WEI Wei;
- MIN Jinghua
- Article
2
- Neural Computing & Applications, 2017, v. 28, n. 5, p. 1031, doi. 10.1007/s00521-015-2115-5
- Kunz, Guilherme;
- Machado, José;
- Perondi, Eduardo
- Article
3
- Journal of Software: Evolution & Process, 2015, v. 27, n. 8, p. 573, doi. 10.1002/smr.1724
- Pries‐Heje, Jan;
- Johansen, Jørn
- Article
4
- Journal of Software: Evolution & Process, 2014, v. 26, n. 9, p. 846, doi. 10.1002/smr.1665
- Mesquida, Antoni‐Lluís;
- Mas, Antonia
- Article
5
- International Journal of Performability Engineering, 2018, v. 14, n. 5, p. 907, doi. 10.23940/ijpe.18.05.p9.907916
- Hui Gao;
- Qichao Song;
- Rui Zhang;
- Jun Huang
- Article
6
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2018, v. 43, n. 6, p. 2843, doi. 10.1007/s13369-017-2853-z
- Onal, Emel;
- Yumak, Kahraman;
- Seker, Serhat
- Article
7
- International Journal of Electrical & Computer Engineering (2088-8708), 2015, v. 5, n. 4, p. 742
- Biyanto, Totok R.;
- Kusuma, Franky;
- Cordova, Hendra;
- Susatio, Yerry;
- Bayuaji, Ridho
- Article
8
- Symmetry (20738994), 2019, v. 11, n. 1, p. 12, doi. 10.3390/sym11010012
- Gebrehiwet, Tsegay;
- Luo, Hanbin
- Article
9
- Symmetry (20738994), 2017, v. 9, n. 10, p. 233, doi. 10.3390/sym9100233
- Sooyoung Kang;
- Seungjoo Kim
- Article
10
- Przegląd Elektrotechniczny, 2017, v. 93, n. 2, p. 173, doi. 10.15199/48.2017.02.38
- ZAWILAK, Tomasz;
- ZAWILAK, Jan
- Article
11
- Methodology & Computing in Applied Probability, 2017, v. 19, n. 4, p. 1107, doi. 10.1007/s11009-016-9501-z
- Lundengård, Karl;
- Rančić, Milica;
- Javor, Vesna;
- Silvestrov, Sergei
- Article
12
- Standards (2305-6703), 2022, v. 2, n. 2, p. 136, doi. 10.3390/standards2020011
- Firman, Andrés;
- Cáceres, Manuel;
- González Mayans, Alexis Raúl;
- Vera, Luis Horacio
- Article