Works matching DE "COMPUTER security management"
1
- International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 2, p. 147, doi. 10.1007/s10009-013-0290-1
- Article
2
- ISSA Journal, 2018, v. 16, n. 4, p. 8
- Article
3
- Intel Technology Journal, 2014, v. 18, n. 4, p. 198
- Nagisetty, Ramune;
- Booth, Cory
- Article
4
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- Edwards, Jonathan;
- Grewal, Ken;
- LeMay, Michael;
- Robinson, Scott H.;
- Sahita, Ravi;
- Woodward, Carl
- Article
5
- Intel Technology Journal, 2014, v. 18, n. 4, p. 162
- Bhargav-Spantzel, Abhilasha
- Article
6
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- Dmitrienko, Alexandra;
- Liebchen, Christopher;
- Rossow, Christian;
- Sadeghi, Ahmad-Reza
- Article
7
- Intel Technology Journal, 2014, v. 18, n. 4, p. 120
- Smith, Ned M.;
- Sheller, Micah;
- Heldt-Sheller, Nathan
- Article
8
- Intel Technology Journal, 2014, v. 18, n. 4, p. 98
- Whitelam, Cameron;
- Bourlai, Thirimachos
- Article
9
- Intel Technology Journal, 2014, v. 18, n. 4, p. 80
- Article
10
- Intel Technology Journal, 2014, v. 18, n. 4, p. 46
- Cornelius, Cory;
- Gutierrez, Christopher N.
- Article
11
- Intel Technology Journal, 2014, v. 18, n. 4, p. 8
- Martin, Jason;
- Rajan, Anand;
- Steigerwald, Bob
- Article
12
- International Transactions on Electrical Energy Systems, 2022, p. 1, doi. 10.1155/2022/3175786
- Article
13
- Strategic Finance, 2005, v. 86, n. 11, p. 55
- Article
14
- Strategic Finance, 2005, v. 86, n. 7, p. 49
- Article
15
- Strategic Finance, 2002, v. 84, n. 3, p. 32
- Article
16
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 603, doi. 10.1093/jigpal/jzs036
- Article
17
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 44, doi. 10.1109/TDSC.2009.23
- Pattabiraman, Karthik;
- Kalbarczyk, Zbigniew;
- Iyer, Ravishankar K.
- Article
18
- International Journal of Online Engineering, 2013, p. 13, doi. 10.3991/ijoe.v9iS2.2562
- CHEN Wanzhi;
- LIU Jiping;
- WANG Yong
- Article
19
- Information Systems Research, 2009, v. 20, n. 1, p. 121, doi. 10.1287/isre.1080.0174
- Ransbotham, Sam;
- Mitra, Sabyasachi
- Article
20
- Journal of Oriental Scientific Research / E-Şarkiyat Ilmi Arastirmalar Dergisi, 2020, v. 12, n. 1, p. 122, doi. 10.26791/sarkiat.606122
- Article
21
- Internal Auditor, 2007, v. 64, n. 5, p. 66
- Article
22
- Internal Auditor, 2007, v. 64, n. 5, p. 15
- Article
23
- Journal of Computer Networks & Communications, 2022, p. 1, doi. 10.1155/2022/9049420
- Article
24
- Bulletin of the Transilvania University of Brasov, Series I: Engineering Sciences, 2015, v. 8, n. 1, p. 79
- Article
25
- Energies (19961073), 2020, v. 13, n. 6, p. 1473, doi. 10.3390/en13061473
- Yigitcanlar, Tan;
- Desouza, Kevin C.;
- Butler, Luke;
- Roozkhosh, Farnoosh
- Article
26
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 5, p. 1909, doi. 10.3837/tiis.2021.05.018
- Bernal, Alejandro Enciso;
- Monterrubio, Sergio Mauricio Martínez;
- Fuente, Javier Parra;
- Crespo, Rubén González;
- Verdú, Elena
- Article
27
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/3323547
- Article
28
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 86, doi. 10.1007/s12083-012-0141-y
- Shafiee Sarjaz, Behrooz;
- Abbaspour, Maghsoud
- Article
29
- Pace International Law Review, 2016, v. 28, n. 1, p. 29, doi. 10.58948/2331-3536.1362
- Article
30
- Asia-Pacific Defence Reporter, 2016, v. 42, n. 9, p. 16
- Article
31
- Defense Acquisition, 2023, v. 52, n. 5, p. 34
- BYCHKOV, DAVID;
- JACOBSON, AARON
- Article
32
- Pedagogía Profesional, 2024, v. 22, n. 2, p. 1
- Alvarez Jofre, Pedro Raúl;
- Orlinda Tarrió Martínez, C. Cristina
- Article
33
- Revista Derecho del Estado, 2009, n. 23, p. 37
- Article
34
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 10, p. 1
- Prabha, Rama;
- Jayanthi R., K. P.
- Article
35
- International Journal of Information Security, 2018, v. 17, n. 1, p. 105, doi. 10.1007/s10207-016-0359-4
- Deepa, G.;
- Thilagam, P. Santhi;
- Khan, Furqan Ahmed;
- Praseed, Amit;
- Pais, Alwyn R.;
- Palsetia, Nushafreen
- Article
36
- International Journal of Information Security, 2015, v. 14, n. 2, p. 123, doi. 10.1007/s10207-014-0252-y
- Armando, Alessandro;
- Costa, Gabriele;
- Merlo, Alessio;
- Verderame, Luca
- Article
37
- International Journal of Information Security, 2015, v. 14, n. 2, p. 103, doi. 10.1007/s10207-014-0253-x
- Martina, Jean;
- Santos, Eduardo;
- Carlos, Marcelo;
- Price, Geraint;
- Custódio, Ricardo
- Article
38
- International Journal of Information Security, 2009, v. 8, n. 2, p. 89, doi. 10.1007/s10207-008-0068-8
- Li, Jiangtao;
- Li, Ninghui;
- Wang, XiaoFeng;
- Yu, Ting
- Article
39
- International Journal of Information Security, 2007, v. 6, n. 5, p. 297, doi. 10.1007/s10207-007-0029-7
- Liu, Jinshan;
- Issarny, Valérie
- Article
40
- Pepperdine Policy Review, 2013, v. 6, p. 1
- Article
41
- Wireless Networks (10220038), 2011, v. 17, n. 5, p. 1217, doi. 10.1007/s11276-011-0343-x
- Wang, Haodong;
- Sheng, Bo;
- Tan, Chiu;
- Li, Qun
- Article
42
- Bulletin of the Atomic Scientists, 2016, v. 72, n. 5, p. 284, doi. 10.1080/00963402.2016.1216502
- Gross, Michael L.;
- Canetti, Daphna;
- Vashdi, Dana R.
- Article
43
- Bulletin of the Atomic Scientists, 2012, v. 68, n. 5, p. 75, doi. 10.1177/0096340212459039
- Article
45
- Journal of Network & Systems Management, 2012, v. 20, n. 4, p. 513, doi. 10.1007/s10922-012-9244-2
- Arias-Cabarcos, Patricia;
- Almenárez-Mendoza, Florina;
- Marín-López, Andrés;
- Díaz-Sánchez, Daniel;
- Sánchez-Guerrero, Rosa
- Article
46
- Sigurnost, 2022, v. 64, n. 2, p. 143
- Bešker, M.;
- Bešker, A.;
- Markulin Grgić, N.
- Article
47
- ComputerWorld Hong Kong, 2016, p. 40
- Article
48
- ComputerWorld Hong Kong, 2016, p. 37
- Article
49
- ComputerWorld Hong Kong, 2011, v. 28, n. 3, p. 24
- Article