Works about COMPUTER network security
1
- Communications Law: Journal of Computer, Media & Telecommunications Law, 2012, v. 17, n. 2, p. 56
- Article
2
- Information Systems & e-Business Management, 2013, v. 11, n. 1, p. 51, doi. 10.1007/s10257-011-0186-0
- Demirkan, Haluk;
- Goul, Michael
- Article
3
- Information Systems & e-Business Management, 2012, v. 10, n. 4, p. 521, doi. 10.1007/s10257-011-0176-2
- Parthasarathy, Rashmi;
- Shirazi, Behrooz;
- Peterson, Nina;
- Song, Wen-Zhan;
- Hurson, Ali
- Article
4
- Information Systems & e-Business Management, 2012, v. 10, n. 4, p. 433, doi. 10.1007/s10257-011-0177-1
- Aissa, Anis;
- Abercrombie, Robert;
- Sheldon, Frederick;
- Mili, Ali
- Article
5
- Information Systems & e-Business Management, 2012, v. 10, n. 4, p. 429, doi. 10.1007/s10257-012-0204-x
- Sheldon, Frederick;
- McDonald, J.
- Article
6
- Society, 1998, v. 35, n. 4, p. 28, doi. 10.1007/BF02686379
- Article
7
- Delta Pi Epsilon Journal, 2011, v. 53, n. 1, p. 42
- Zhao, Jensen J.;
- Truell, Allen D.;
- Alexander, Melody W.;
- Woosley, Sherry A.
- Article
8
- Computing & Control Engineering, 2006, v. 17, n. 2, p. 12, doi. 10.1049/cce:20060201
- Article
9
- Computing & Control Engineering, 2003, v. 14, n. 5, p. 4
- Article
10
- International Journal of Wavelets, Multiresolution & Information Processing, 2023, v. 21, n. 1, p. 1, doi. 10.1142/S0219691322500436
- Yang, Haibo;
- Ji, Yulong;
- Pan, Yanfeng;
- Zou, Bin;
- Fu, Yingxiong
- Article
11
- Electrical Engineering, 2025, v. 107, n. 2, p. 1885, doi. 10.1007/s00202-024-02618-y
- Ramesh, Bhuvanagiri;
- Khedkar, Mohan;
- Kotha, Sravan Kumar;
- Pemmada, Sumanth
- Article
12
- Electrical Engineering, 2024, v. 106, n. 5, p. 5625, doi. 10.1007/s00202-024-02320-z
- Deng, Huiqiong;
- Wang, Xiaoming;
- Zhong, Yunheng;
- Chen, Shiju
- Article
13
- Electrical Engineering, 2023, v. 105, n. 5, p. 2935, doi. 10.1007/s00202-023-01869-5
- Korashy, Ahmed;
- Kamel, Salah;
- Jurado, Francisco
- Article
14
- Electrical Engineering, 2023, v. 105, n. 2, p. 993, doi. 10.1007/s00202-022-01711-4
- Ramesh, B.;
- Khedkar, Mohan;
- Kulkarni, Nitin Kumar;
- Kumar, Raushan
- Article
15
- Electrical Engineering, 2013, v. 95, n. 2, p. 99, doi. 10.1007/s00202-012-0244-8
- Ringelband, Tilman;
- Schäfer, Philipp;
- Moser, Albert
- Article
16
- International Journal of Image & Graphics, 2006, v. 6, n. 3, p. 407, doi. 10.1142/S0219467806002318
- Bin Li;
- Zhang, David;
- Kuanquan Wang
- Article
17
- International Journal of Image & Graphics, 2006, v. 6, n. 1, p. 45, doi. 10.1142/S021946780600215X
- CAO, WEIQUN;
- GAERTNER, HENDRIK;
- GUDDAT, HANNES;
- STRAUBE, ANDREAS M.;
- CONRAD, STEFAN;
- KRUIJFF, ERNST;
- LANGENBERG, DIRK
- Article
18
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 167, doi. 10.1142/S0219467805001719
- Article
19
- Fluctuation & Noise Letters, 2014, v. 13, n. 3, p. -1, doi. 10.1142/S0219477514500205
- Saez, Y.;
- Cao, X.;
- Kish, L. B.;
- Pesti, G.
- Article
20
- 2021
- Boyce, Matthew R;
- Katz, Rebecca
- journal article
21
- Network (2673-8732), 2025, v. 5, n. 1, p. 1, doi. 10.3390/network5010001
- Article
22
- Network (2673-8732), 2024, v. 4, n. 3, p. 338, doi. 10.3390/network4030016
- Puhl, Zachary T.;
- Guo, Jinhua
- Article
23
- Network (2673-8732), 2023, v. 3, n. 4, p. 469, doi. 10.3390/network3040020
- Nakano, Yujin;
- Matsuzawa, Tomofumi
- Article
24
- Network (2673-8732), 2022, v. 2, n. 3, p. 419, doi. 10.3390/network2030026
- Edris, Ed Kamya Kiyemba;
- Aiash, Mahdi;
- Loo, Jonathan
- Article
25
- Cihan University-Erbil Scientific Journal, 2024, v. 8, n. 2, p. 43, doi. 10.24086/cuesj.v8n2y2024.pp43-48
- QasMarrogy, Ghassan A.;
- Nahi, Abdullah A.;
- Yousif, Rose M. S.
- Article
26
- Global Energy Interconnection, 2022, v. 5, n. 4, p. 409, doi. 10.1016/j.gloei.2022.08.007
- Jingcheng Mei;
- Jingbo Hu;
- Zhengdong Wan;
- Donglian Qi
- Article
27
- FUPRE Journal of Scientific & Industrial Research, 2024, v. 8, n. 1, p. 69
- AKAZUE, M.;
- ONYEACHOLEM, I. J.;
- OMEDE, E.
- Article
28
- IET Intelligent Transport Systems (Wiley-Blackwell), 2019, v. 13, n. 6, p. 1033, doi. 10.1049/iet-its.2018.5314
- Vo, Son Anh;
- Mirowski, Luke;
- Scanlan, Joel;
- Turner, Paul
- Article
29
- IET Intelligent Transport Systems (Wiley-Blackwell), 2019, v. 13, n. 5, p. 780, doi. 10.1049/iet-its.2018.5117
- Arshad, Muhammad;
- Ullah, Zahid;
- Khalid, Muhammad;
- Ahmad, Naveed;
- Khalid, Waqar;
- Shahwar, Duri;
- Cao, Yue
- Article
30
- IET Intelligent Transport Systems (Wiley-Blackwell), 2016, v. 10, n. 6, p. 379, doi. 10.1049/iet-its.2015.0072
- Azees, Maria;
- Vijayakumar, Pandi;
- Deborah, Lazarus Jegatha
- Article
31
- IET Intelligent Transport Systems (Wiley-Blackwell), 2014, v. 8, n. 2, p. 155, doi. 10.1049/iet-its.2012.0070
- Wang, Jian;
- Liu, Yanheng;
- Deng, Kevin
- Article
32
- IET Information Security (Wiley-Blackwell), 2024, v. 2024, p. 1, doi. 10.1049/2024/8821891
- Kumari, Shalini;
- Prabha, Chander;
- Karim, Asif;
- Hassan, Md. Mehedi;
- Azam, Sami;
- Zhu, Peican
- Article
33
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 681, doi. 10.1049/ise2.12124
- Reno, Saha;
- Haque, Md. Mokammel
- Article
34
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 598, doi. 10.1049/ise2.12118
- He, Liukun;
- Wang, Liangmin;
- Cheng, Keyang;
- Xu, Yifan
- Article
35
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 505, doi. 10.1049/ise2.12112
- Bai, Wei;
- Cheng, Angxuan;
- Wang, Cailing;
- Pan, Zhisong
- Article
36
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 377, doi. 10.1049/ise2.12102
- Do, Ngoc‐Tuan;
- Hoang, Van‐Phuc;
- Doan, Van Sang;
- Pham, Cong‐Kha
- Article
37
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 161, doi. 10.1049/ise2.12051
- Shaohui, Mo;
- Tuerhong, Gulanbaier;
- Wushouer, Mairidan;
- Yibulayin, Tuergen
- Article
38
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 178, doi. 10.1049/ise2.12050
- Li, Huanruo;
- Guo, Yunfei;
- Sun, Penghao;
- Wang, Yawen;
- Huo, Shumin
- Article
39
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 2, p. 86, doi. 10.1049/ise2.12046
- Liu, Liang;
- Yin, Yue;
- Wu, Zhijun;
- Pan, Qingbo;
- Yue, Meng
- Article
40
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 2, p. 133, doi. 10.1049/ise2.12043
- Chen, Jiongyi;
- Xu, Fenghao;
- Dong, Shuaike;
- Sun, Wei;
- Zhang, Kehuan
- Article
41
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 5, p. 395, doi. 10.1049/ise2.12028
- Wang, Dachao;
- Wang, Baocang;
- Ping, Yuan
- Article
42
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 4, p. 297, doi. 10.1049/ise2.12023
- Sarihi, Amin;
- Patooghy, Ahmad;
- Amininasab, Mahdi;
- Shokrolah Shirazi, Mohammad;
- A. Badawy, Abdel‐Hameed
- Article
43
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 452, doi. 10.1049/iet-ifs.2018.5512
- Hongsong, Chen;
- Caixia, Meng;
- Zhongchuan, Fu;
- Lee, Chao‐Hsien
- Article
44
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 401, doi. 10.1049/iet-ifs.2018.5286
- Wang, Xiujuan;
- Tang, Haoyang;
- Zheng, Kangfeng;
- Tao, Yuanrui
- Article
45
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 368, doi. 10.1049/iet-ifs.2019.0447
- Ingham, Max;
- Marchang, Jims;
- Bhowmik, Deepayan
- Article
46
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 3, p. 253, doi. 10.1049/iet-ifs.2020.0128
- Article
47
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 51, doi. 10.1049/iet-ifs.2019.0157
- Shortell, Thomas;
- Shokoufandeh, Ali
- Article
48
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 39, doi. 10.1049/iet-ifs.2019.0409
- Article
49
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 21, doi. 10.1049/iet-ifs.2018.5443
- Gharsallah, Ikram;
- Smaoui, Salima;
- Zarai, Faouzi
- Article
50
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 541, doi. 10.1049/iet-ifs.2018.5147
- Yan, Dingyu;
- Liu, Feng;
- Zhang, Yaqin;
- Jia, Kun
- Article