Works matching DE "COMPUTER passwords"
1
- Computer-Aided Design & Applications, 2009, v. 6, n. 4, p. 553, doi. 10.3722/cadaps.2009.553-561
- Article
2
- PLoS ONE, 2025, v. 20, n. 6, p. 1, doi. 10.1371/journal.pone.0323954
- Oliullah, Khondokar;
- Whaiduzzaman, Md;
- Mahi, Md. Julkar Nayeen;
- Jan, Tony;
- Barros, Alistair
- Article
3
- TEM Journal, 2025, v. 14, n. 2, p. 1140, doi. 10.18421/TEM142-15
- Article
4
- IAENG International Journal of Computer Science, 2025, v. 52, n. 6, p. 1940
- Mishra, Ashutosh;
- Mishra, Sweta;
- Panday, Sunil
- Article
5
- Journal of Emerging Technologies in Accounting, 2021, v. 18, n. 2, p. 157, doi. 10.2308/JETA-19-09-02-36
- Tinkelman, Daniel P.;
- Gomaa, Mohamed
- Article
6
- International Review of Law, Computers & Technology, 2013, v. 27, n. 1/2, p. 230, doi. 10.1080/13600869.2013.764142
- Schweighofer, Erich;
- Hötzendorfer, Walter
- Article
7
- SAM Advanced Management Journal (00360805), 1971, v. 36, n. 3, p. 8
- Article
8
- Journal of Computer-Mediated Communication, 2006, v. 12, n. 1, p. 114, doi. 10.1111/j.1083-6101.2006.00317.x
- Heisler, Jennifer M.;
- Crabill, Scott L.
- Article
9
- Computer Systems Science & Engineering, 2002, v. 17, n. 6, p. 315
- Article
10
- Informing Science, 2004, v. 7, p. 67
- Carstens, Deborah Sater;
- McCauley-Bell, Pamela R.;
- Malone, Linda C.;
- DeMara, Ronald F.
- Article
11
- Government Technology, 2025, v. 38, n. 1, p. 7
- RAY, SCOTTIE;
- CAIMI, STEVE
- Article
12
- Government Technology, 2024, v. 37, n. 3, p. 38
- Article
13
- Government Technology, 2024, v. 37, n. 3, p. 8
- Article
14
- Government Technology, 2022, v. 35, n. 7, p. 22
- Article
15
- Government Technology, 2018, v. 31, n. 2, p. 44
- Article
16
- Government Technology, 2013, v. 26, n. 11, p. 14
- Article
17
- Government Technology, 2010, v. 23, n. 2, p. 31
- Article
18
- Government Technology, 2008, v. 21, n. 6, p. 50
- Article
20
- Cartographic Journal, 2022, v. 59, n. 2, p. 150, doi. 10.1080/00087041.2021.2006980
- Coetzee, Serena;
- Carow, Sanet;
- Snyman, Lourens
- Article
21
- Bio-IT World, 2010, v. 9, n. 1, p. 40
- Article
22
- Personal & Ubiquitous Computing, 2021, v. 25, n. 5, p. 813, doi. 10.1007/s00779-020-01477-1
- Grobler, Marthie;
- Chamikara, M. A. P.;
- Abbott, Jacob;
- Jeong, Jongkil Jay;
- Nepal, Surya;
- Paris, Cecile
- Article
23
- Personal & Ubiquitous Computing, 2016, v. 20, n. 4, p. 573, doi. 10.1007/s00779-016-0928-6
- Maqsood, Sana;
- Chiasson, Sonia;
- Girouard, Audrey
- Article
24
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 3, p. 444, doi. 10.3390/jcp2030023
- Al-Aboosi, Abdullah F.;
- Broner, Matan;
- Al-Aboosi, Fadhil Y.
- Article
25
- Amman Arab University Journal, 2023, v. 8, n. 1, p. 128
- Article
26
- Journal of Telecommunications & the Digital Economy, 2022, v. 10, n. 4, p. 72, doi. 10.18080/jtde.v10n4.564
- Abbassi, Younes;
- Toumi, Hicham;
- Ben Lahmar, El Habib
- Article
27
- i-Manager's Journal on Image Processing, 2020, v. 7, n. 2, p. 1, doi. 10.26634/jip.7.2.17169
- OLATUNBOSUN, ADEBOYE;
- OLADELE, BAMIGBOYE OLADAYO
- Article
28
- Uporabna Informatika, 2022, v. 33, n. 5, p. 169
- Bošnjak, Leon;
- Taneski, Viktor
- Article
29
- International Journal of Advances in Intelligent Informatics, 2015, v. 1, n. 2, p. 98, doi. 10.26555/ijain.v1i2.24
- Jawahir, Ahmad;
- Haviluddin
- Article
30
- Journal of Computing & Security, 2021, v. 8, n. 1, p. 19, doi. 10.22108/JCS.2021.127261.1064
- Sadeghi, Samira;
- Hadavi, Mohammad Ali
- Article
31
- Complex Systems, 2021, v. 30, n. 3, p. 375, doi. 10.25088/ComplexSystems.30.3.375
- Article
32
- Journal of Network & Information Security, 2023, v. 11, n. 1, p. 20
- Article
33
- Journal of Applied Information Science, 2022, v. 10, n. 1, p. 44
- Amudhavalli, P.;
- Rajesh, Sudha;
- J. N., Naseeruddin
- Article
34
- Revue d'Intelligence Artificielle, 2024, v. 38, n. 1, p. 269, doi. 10.18280/ria.380128
- Chinchalkar, Soham P.;
- Somkunwar, Rachna K.
- Article
35
- Ingénierie des Systèmes d'Information, 2023, v. 28, n. 6, p. 1669, doi. 10.18280/isi.280625
- Hashmi, Syed Shakeel;
- Abdul, Arif Mohammad;
- Mohammad, Arshad Ahmad Khan;
- Atheeq, C.;
- Chinapaga, Ravi
- Article
36
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 5, p. 52, doi. 10.3969/j.issn.2095-476X.2014.05.012
- GAN Yong;
- YANG Jia-jia;
- LI Tian-bao
- Article
37
- Plant Cell, 2009, v. 21, n. 12, p. 3715, doi. 10.1105/tpc.109.211280
- Article
38
- Document News, 2012, v. 30, n. 5/6, p. 11
- Article
39
- Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition) / Chongqing Youdian Daxue Xuebao (Ziran Kexue Ban), 2023, v. 35, n. 2, p. 343, doi. 10.3979/j.issn.1673-825X.202110030348
- Article
40
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2024, v. 14, n. 1/2, p. 97, doi. 10.15276/imms.v14.no1-2.97
- Слабенко, Д. М.;
- Стопакевич, О. А.;
- Стопакевич, А. О.
- Article
41
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 3, p. 243, doi. 10.15276/imms.v12.no3.243
- Шеремет, Г. О.;
- Стопакевич, О. А.
- Article
42
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 1/2, p. 15, doi. 10.15276/imms.v12.no1-2.15
- Гаврилюк, Б. В.;
- Зоріло, В. В.;
- Кушніренко, Н. І.;
- Осколкова, О. Р.
- Article
43
- Frontiers in Psychology, 2018, p. N.PAG, doi. 10.3389/fpsyg.2018.01195
- Boskovic, Irena;
- Biermans, Anita J.;
- Merten, Thomas;
- Jelicic, Marko;
- Hope, Lorraine;
- Merckelbach, Harald
- Article
44
- Applied Nanoscience, 2023, v. 13, n. 2, p. 1655, doi. 10.1007/s13204-021-02021-0
- Subbarao, D.;
- Raju, Bhagya;
- Anjum, Farha;
- Rao, Ch venkateswara;
- Reddy, B. Mahender
- Article
45
- Journal of Medical Internet Research, 2013, v. 15, n. 8, p. 1, doi. 10.2196/JMIR.2461
- Rockwood, Kenneth;
- Richard, Matthew;
- Leibman, Chris;
- Mucha, Lisa;
- Mitnitski, Arnold
- Article
46
- Journal of Medical Internet Research, 2013, v. 15, n. 8, p. 1, doi. 10.2196/JMIR.2366
- Brumen, Bostjan;
- Heričko, Marjan;
- Rozman, Ivan;
- Hölbl, Marko
- Article
47
- Journal of Medical Internet Research, 2012, v. 14, n. 1, p. 33, doi. 10.2196/jmir.1906
- Cipresso, Pietro;
- Gaggioli, Andrea;
- Serino, Silvia;
- Cipresso, Sergio;
- Riva, Giuseppe
- Article
48
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6778755
- Wang, Ziqi;
- Liao, Lingzhi;
- Meng, Ruohan;
- Yang, Ching-Nung;
- Zhou, Zhili;
- Yang, Hengfu
- Article
49
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/5670629
- Zhou, Tao;
- Wu, Hao-Tian;
- Lu, Hui;
- Xu, Peiming;
- Cheung, Yiu-Ming
- Article
50
- Information (2078-2489), 2024, v. 15, n. 1, p. 47, doi. 10.3390/info15010047
- Mekruksavanich, Sakorn;
- Jitpattanakul, Anuchit
- Article