Works matching DE "COMPUTER security research"
1
- IET Communications (Wiley-Blackwell), 2015, v. 9, n. 15, p. 1857, doi. 10.1049/iet-com.2014.0933
- Hooshmand, Reza;
- Aref, Mohammad Reza;
- Eghlidos, Taraneh
- Article
2
- Journal of the Association for Information Systems, 2016, v. 17, n. 1, p. 39
- Wall, Jeffrey D.;
- Lowry, Paul Benjamin;
- Barlow, Jordan B.
- Article
3
- Communications of the Association for Information Systems, 2004, v. 14, p. 678, doi. 10.17705/1CAIS.01432
- Article
4
- Journal of Management Information Systems, 2012, v. 29, n. 3, p. 117, doi. 10.2753/MIS0742-1222290304
- Hui, Kai-Lung;
- Hui, Wendy;
- Yue, Wei T.
- Article
5
- Journal of Management Information Systems, 2011, v. 28, n. 2, p. 203, doi. 10.2753/MIS0742-1222280208
- Guo, Ken H.;
- Yuan, Yufei;
- Archer, Norman P.;
- Connelly, Catherine E.
- Article
6
- Journal of Management Information Systems, 2010, v. 27, n. 2, p. 189, doi. 10.2753/MIS0742-1222270206
- Mai, Bin;
- Menon, Nirup M.;
- Sarkar, Sumit
- Article
7
- Discrete Dynamics in Nature & Society, 2012, p. 1, doi. 10.1155/2012/371792
- Jianguo Ren;
- Yonghong Xu;
- Yongchang Zhang;
- Yongquan Dong;
- Guosheng Hao
- Article
8
- Intel Technology Journal, 2014, v. 18, n. 2, p. 34
- Article
9
- International Journal of Combinatorial Optimization Problems & Informatics, 2014, v. 5, n. 1, p. 2
- Díaz-Parra, Ocotlán;
- Ruiz-Vanoye, Jorge A.;
- Barrera-Cámara, Ricardo A.;
- Fuentes-Penna, Alejandro;
- Sandoval, Natalia
- Article
10
- Intelligent Buildings International, 2012, v. 4, n. 3, p. 169, doi. 10.1080/17508975.2012.695277
- Article
11
- Information Systems Research, 2009, v. 20, n. 1, p. 79, doi. 10.1287/isre.1070.0160
- D’Arcy, John;
- Hovav, Anat;
- Galletta, Dennis
- Article
12
- Journal of Electronic Imaging, 2015, v. 24, n. 3, p. 1, doi. 10.1117/1.JEI.24.3.033021
- Xing Hu;
- Shiqiang Hu;
- Jinhua Xie;
- Shiyou Zheng
- Article
13
- Terrorism & Political Violence, 2015, v. 27, n. 4, p. 657, doi. 10.1080/09546553.2013.847827
- Jarvis, Lee;
- Macdonald, Stuart
- Article
14
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
- Article
15
- Media, Culture & Public Relations, 2015, v. 6, n. 1, p. 56
- Antoliš, Krunoslav;
- Mišević, Petar;
- Miličević, Ana
- Article
16
- Information Technologist, 2012, v. 9, n. 2, p. 131
- Obahiagbon, Kingsley;
- Odion, Andrew Ebhomien;
- Okpah, Amenze Eghonghon
- Article
17
- ISeCure, 2013, v. 5, n. 2, p. 119
- Javadi, Seyyed Ahmad;
- Amini, Morteza
- Article
18
- ISeCure, 2013, v. 5, n. 2, p. 74
- Avizheh, Sepideh;
- Assar, Maryam Rajabzadeh;
- Salmasizadeh, Mahmoud
- Article
19
- ISeCure, 2013, v. 5, n. 2, p. 209
- Azmi, Reza;
- Pishgoo, Boshra
- Article
20
- Journal of Virtual Worlds Research, 2014, v. 7, n. 1, p. 1, doi. 10.4101/jvwr.v7i1.7067
- Pridmore, Jeannie;
- Overocker, John
- Article
21
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 628, doi. 10.1007/s12083-012-0181-3
- Choi, Yungho;
- Kim, Lark-Kyo;
- Ahn, Hyungkeun;
- Park, Neungsoo
- Article
22
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 710, doi. 10.1007/s12083-012-0194-y
- Article
23
- Software: Practice & Experience, 2013, v. 43, n. 12, p. 1489, doi. 10.1002/spe.2148
- Berbecaru, Diana;
- Casalino, Matteo M.;
- Lioy, Antonio
- Article
24
- Sensors (14248220), 2014, v. 14, n. 8, p. 15203, doi. 10.3390/s140815203
- Fernández-Berni, Jorge;
- Carmona-Galán, Ricardo;
- Río, Rocío del;
- Kleihorst, Richard;
- Philips, Wilfried;
- Rodríguez-Vázquez, Ángel
- Article
25
- Sensors (14248220), 2014, v. 14, n. 8, p. 14786, doi. 10.3390/s140814786
- Ndibanje, Bruce;
- Hoon-Jae Lee;
- Sang-Gon Lee
- Article
26
- Sensors (14248220), 2014, v. 14, n. 7, p. 11379, doi. 10.3390/s140711379
- Article
27
- Sensors (14248220), 2014, v. 14, n. 6, p. 10081, doi. 10.3390/s140610081
- Younsung Choi;
- Donghoon Lee;
- Jiye Kim;
- Jaewook Jung;
- Junghyun Nam;
- Dongho Won
- Article
28
- Sensors (14248220), 2013, v. 13, n. 11, p. 14888, doi. 10.3390/s131114888
- Moreno Sanchez, Pedro;
- Lopez, Rafa Marin;
- Gomez Skarmeta, Antonio F.
- Article
29
- Journal of Information Systems, 2012, v. 26, n. 2, p. 71, doi. 10.2308/isys-50244
- Smith, Antoinette L.;
- Baxter, Ryan J.;
- Boss, Scott R.;
- Hunton, James E.
- Article
30
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 59, doi. 10.19107/ijisc.2014.01.07
- Article
31
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 47
- Article
32
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 37, doi. 10.19107/ijisc.2014.01.04
- GHERGHINA, Cătălina;
- PETRICĂ, Gabriel
- Article
33
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 29, doi. 10.19107/ijisc.2014.01.03
- BARBU, Ionuţ-Daniel;
- PASCARIU, Cristian
- Article
34
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 17, doi. 10.19107/ijisc.2014.01.02
- SINGH, P. K.;
- SANGWAN, O. P.;
- PRATAP, Amrendra;
- SINGH, Amar Pal
- Article
35
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 259, doi. 10.18372/2225-5036.20.7553
- Article
36
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 231, doi. 10.18372/2225-5036.20.7548
- Khlaponin, Yu.;
- Kozlovskiy, V.;
- Mischchenko A., A.
- Article
37
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 217, doi. 10.18372/2225-5036.20.7546
- Article
38
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 209, doi. 10.18372/2225-5036.19.5628
- Kovtun, V. Yu.;
- Gnatyuk, S. O.;
- Kinzeryavyy, O. M.
- Article
39
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 175, doi. 10.18372/2225-5036.19.5620
- Article
40
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 6, p. 15
- Singh, Yudhvir;
- Siwach, Vikas;
- Aggarwal, Divya
- Article
41
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 4, p. 37
- Pahwa, Bharti;
- Shipra;
- Ratra, Jyoti;
- Chauhan, Mahesh
- Article
42
- International Journal of Information Security, 2012, v. 11, n. 4, p. 269, doi. 10.1007/s10207-012-0165-6
- Yaseen, Qussai;
- Panda, Brajendra
- Article
43
- International Journal of Information Security, 2012, v. 11, n. 4, p. 281, doi. 10.1007/s10207-012-0166-5
- Article
44
- International Journal of Information Security, 2011, v. 10, n. 6, p. 351, doi. 10.1007/s10207-011-0140-7
- Sánchez García, Sergio;
- Gómez Oliva, Ana;
- Pérez Belleboni, Emilia;
- Pau de la Cruz, Iván
- Article
45
- International Journal of Information Security, 2011, v. 10, n. 6, p. 387, doi. 10.1007/s10207-011-0145-2
- Miret, Josep;
- Sebé, Francesc
- Article
46
- International Journal of Information Security, 2011, v. 10, n. 6, p. 337, doi. 10.1007/s10207-011-0144-3
- Glisson, William;
- Storer, Tim;
- Mayall, Gavin;
- Moug, Iain;
- Grispos, George
- Article
47
- International Journal of Information Security, 2011, v. 10, n. 6, p. 373, doi. 10.1007/s10207-011-0146-1
- Huang, Qiong;
- Yang, Guomin;
- Wong, Duncan;
- Susilo, Willy
- Article
48
- International Journal of Information Security, 2011, v. 10, n. 6, p. 321, doi. 10.1007/s10207-011-0147-0
- Gyorffy, John;
- Tappenden, Andrew;
- Miller, James
- Article
49
- International Journal of Information Security, 2011, v. 10, n. 5, p. 301, doi. 10.1007/s10207-011-0133-6
- Marconi, Luciana;
- Conti, Mauro;
- Di Pietro, Roberto
- Article
50
- International Journal of Information Security, 2011, v. 10, n. 5, p. 285, doi. 10.1007/s10207-011-0130-9
- Chang, Ee-Chien;
- Lu, Liming;
- Wu, Yongzheng;
- Yap, Roland;
- Yu, Jie
- Article