Works matching DE "COMPUTER network security software"
1
- Management Science, 2006, v. 52, n. 11, p. 1703, doi. 10.1287/mnsc.1060.0568
- August, Terrence;
- Tunca, Tunay I.
- Article
2
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1215, doi. 10.1007/s11277-016-3825-4
- Article
3
- Informatica Economica, 2013, v. 17, n. 1, p. 144, doi. 10.12948/issn14531305/17.1.2013.12
- Article
4
- Internal Auditor, 2000, v. 57, n. 4, p. 49
- Article
5
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 3, p. 209, doi. 10.1080/15501320701863460
- Brooks, R. R.;
- Govindaraju, P. Y.;
- Pirretti, M.;
- Vijaykrishnan, N.;
- Kandemir, M.
- Article
6
- Chinese Librarianship, 2012, n. 33, p. 1
- Wani, Zahid Ashraf;
- Lone, Mohammad Ishaq;
- Shah, Anshana
- Article
7
- Wireless Personal Communications, 2011, v. 61, n. 3, p. 511, doi. 10.1007/s11277-011-0383-7
- Ulltveit-Moe, Nils;
- Oleshchuk, Vladimir
- Article
8
- 2011
- Prasad, Ramjee;
- Reichert, Frank
- Editorial
9
- Journal of Algebraic Statistics, 2022, v. 13, n. 1, p. 62
- Bharti, Meena;
- Rani, Shaveta;
- Singh, Paramjeet
- Article
10
- Security & Communication Networks, 2016, v. 9, n. 6, p. 492, doi. 10.1002/sec.934
- Nasridinov, Aziz;
- Jeong, Young-Sik;
- Byun, Jeong-Yong;
- Park, Young-Ho
- Article
11
- Security & Communication Networks, 2015, v. 8, n. 17, p. 2957, doi. 10.1002/sec.1222
- Rafe, Vahid;
- Hosseinpouri, Ramin
- Article
12
- Security & Communication Networks, 2013, v. 6, n. 5, p. 567, doi. 10.1002/sec.575
- Sqalli, Mohammed H.;
- Firdous, Syed Naeem;
- Salah, Khaled;
- Abu-Amara, Marwan
- Article
13
- Journal of Network & Systems Management, 2011, v. 19, n. 4, p. 427, doi. 10.1007/s10922-010-9188-3
- Liu, Xingwei;
- Fang, Xuming;
- Qin, Zhenhua;
- Ye, Chun;
- Xie, Miao
- Article
14
- Journal of Network & Systems Management, 2011, v. 19, n. 4, p. 448, doi. 10.1007/s10922-010-9197-2
- Huang, Dijiang;
- Tsai, Wei-Tek;
- Tseng, Yi-hsin
- Article
15
- TCE: The Chemical Engineer, 2018, n. 923, p. 45
- Article
16
- Journal of Mathematical Cryptology, 2017, v. 11, n. 4, p. 215, doi. 10.1515/jmc-2016-0003
- Article