Works matching DE "COMPUTER security research"
1
- Issues in Science & Technology, 2001, v. 18, n. 2, p. 43
- Bonvillian, William B.;
- Sharp, Kendra V.
- Article
2
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 6, p. 15
- Singh, Yudhvir;
- Siwach, Vikas;
- Aggarwal, Divya
- Article
3
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 4, p. 37
- Pahwa, Bharti;
- Shipra;
- Ratra, Jyoti;
- Chauhan, Mahesh
- Article
4
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1071, doi. 10.2298/CSIS130922065D
- Inshil Doh;
- Jiyoung Lim;
- Shi Li;
- Kijoon Chae
- Article
5
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 975, doi. 10.2298/CSIS130917060G
- Tianhan Gao;
- Nan Guo;
- Kangbin Yim;
- Qianyi Wang
- Article
6
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 905, doi. 10.2298/CSIS130921056H
- Yi-Li Huang;
- Fang-Yie Leu;
- Jian-Hong Chen;
- Cheng-Chung Chu, William
- Article
7
- Journal of Empirical Research on Human Research Ethics, 2011, v. 6, n. 2, p. 71, doi. 10.1525/jer.2011.6.2.71
- BUCHANAN, ELIZABETH;
- AYCOCK, JOHN;
- DEXTER, SCOTT;
- DITTRICH, DAVID;
- HVIZDAK, ERIN
- Article
8
- Journal of Algorithms & Computational Technology, 2011, v. 5, n. 3, p. 437, doi. 10.1260/1748-3018.5.3.437
- Article
9
- Journal of Algorithms & Computational Technology, 2010, v. 4, n. 4, p. 555, doi. 10.1260/1748-3018.4.4.555
- Shah, Deven;
- Vyas, Vaibhav;
- Vyas, Vishal;
- Patel, Dhiren
- Article
10
- Economic Computation & Economic Cybernetics Studies & Research, 2015, v. 49, n. 1, p. 121
- ORZAN, Gheorghe;
- IOANĂS, Maria Elisabeta;
- RADU, Anamaria-Cătălina;
- STOICA, Ivona;
- POPESCU, Manoela
- Article
11
- Mathematical Structures in Computer Science, 2010, v. 20, n. 1, p. 3, doi. 10.1017/S0960129509990247
- Bugliesi, Michele;
- Focardi, Riccardo
- Article
12
- Computer Journal, 2014, v. 57, n. 10, p. 1537, doi. 10.1093/comjnl/bxt090
- Chen, Yu;
- Zhang, Zongyang;
- Lin, Dongdai;
- Cao, Zhenfu
- Article
13
- Computer Journal, 2014, v. 57, n. 4, p. 624, doi. 10.1093/comjnl/bxt046
- Babamir, Faezeh Sadat;
- Norouzi, Ali
- Article
14
- Computer Journal, 2009, v. 52, n. 3, p. 305, doi. 10.1093/comjnl/bxn016
- David Power;
- Mark Slaymaker;
- Andrew Simpson
- Article
15
- Journal of Applied Global Research, 2010, v. 3, n. 7, p. 50
- Akkaladevi, Somasheker;
- Katangur, Ajay K.
- Article
16
- DLSU Business & Economics Review, 2014, v. 24, n. 1, p. 96
- Article
17
- Defence Science Journal, 2016, v. 66, n. 2, p. 138, doi. 10.14429/dsj.66.9701
- Kapoor, Akshay;
- Dhavale, Sunita
- Article
18
- Defence Science Journal, 2013, v. 63, n. 1, p. 6, doi. 10.14429/dsj2013.6592
- Kambala, S.;
- Vaidyanathaswami, R.;
- Thangaraj, A.
- Article
19
- Intel Technology Journal, 2014, v. 18, n. 2, p. 34
- Article
20
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 259, doi. 10.18372/2225-5036.20.7553
- Article
21
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 231, doi. 10.18372/2225-5036.20.7548
- Khlaponin, Yu.;
- Kozlovskiy, V.;
- Mischchenko A., A.
- Article
22
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 217, doi. 10.18372/2225-5036.20.7546
- Article
23
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 209, doi. 10.18372/2225-5036.19.5628
- Kovtun, V. Yu.;
- Gnatyuk, S. O.;
- Kinzeryavyy, O. M.
- Article
24
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 175, doi. 10.18372/2225-5036.19.5620
- Article
25
- Journal of Sensor & Actuator Networks, 2013, v. 2, n. 2, p. 316, doi. 10.3390/jsan2020316
- Kushwaha, Manish;
- Koutsoukos, Xenofon
- Article
26
- Revista Eletrônica de Sistemas de Informação, 2013, v. 12, n. 1, p. 1, doi. 10.5329/RESI.2013.1201003
- Alencar Rigon, Evandro;
- Merkle Westphall, Carla
- Article
27
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0037-0
- El-Booz, Sheren;
- Attiya, Gamal;
- El-Fishawy, Nawal
- Article
28
- Journal of Applied Security Research, 2010, v. 5, n. 3, p. 306, doi. 10.1080/19361610.2010.484833
- Article
29
- Entropy, 2016, v. 18, n. 5, p. 163, doi. 10.3390/e18050163
- Yan Chang;
- Shibin Zhang;
- Guihua Han;
- Zhiwei Sheng;
- Lili Yan;
- Jinxin Xiong
- Article
30
- MIS Quarterly, 2011, v. 35, n. 2, p. 397, doi. 10.2307/23044049
- Chen, Pei-yu;
- Kataria, Gaurav;
- Krishnan, Ramayya
- Article
31
- Journal of the Association for Information Systems, 2016, v. 17, n. 1, p. 39
- Wall, Jeffrey D.;
- Lowry, Paul Benjamin;
- Barlow, Jordan B.
- Article
32
- Communications of the Association for Information Systems, 2004, v. 14, p. 678, doi. 10.17705/1CAIS.01432
- Article
33
- Journal of Management Information Systems, 2012, v. 29, n. 3, p. 117, doi. 10.2753/MIS0742-1222290304
- Hui, Kai-Lung;
- Hui, Wendy;
- Yue, Wei T.
- Article
34
- Journal of Management Information Systems, 2011, v. 28, n. 2, p. 203, doi. 10.2753/MIS0742-1222280208
- Guo, Ken H.;
- Yuan, Yufei;
- Archer, Norman P.;
- Connelly, Catherine E.
- Article
35
- Journal of Management Information Systems, 2010, v. 27, n. 2, p. 189, doi. 10.2753/MIS0742-1222270206
- Mai, Bin;
- Menon, Nirup M.;
- Sarkar, Sumit
- Article
36
- Technical Journal of University of Engineering & Technology Taxila, 2015, v. 20, n. 3, p. 48
- Muhammad, K.;
- Jan, Z.;
- Ahmad, J.;
- Khan, Z.
- Article
37
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
- Article
38
- Journal of the American Medical Informatics Association, 2010, v. 17, n. 2, p. 148, doi. 10.1136/jamia.2009.000232
- Emam, Khaled El;
- Neri, Emilio;
- Jonker, Elizabeth;
- Sokolova, Marina;
- Peyton, Liam;
- Neisa, Angelica;
- Scassa, Teresa
- Article
39
- International Journal of Information Dissemination & Technology, 2013, v. 3, n. 3, p. 222
- Article
40
- Military Engineer / Hadmérnök, 2012, v. 7, n. 2, p. 47
- Article
41
- Journal of Virtual Worlds Research, 2014, v. 7, n. 1, p. 1, doi. 10.4101/jvwr.v7i1.7067
- Pridmore, Jeannie;
- Overocker, John
- Article
42
- Information Security Journal: A Global Perspective, 2014, v. 23, n. 1/2, p. 10, doi. 10.1080/19393555.2014.891274
- Jali, Mohd Zalisham;
- Furnell, Steven M.;
- Dowland, Paul S.
- Article
43
- Information Security Journal: A Global Perspective, 2011, v. 20, n. 2, p. 112, doi. 10.1080/19393555.2011.560925
- Thiruvaazhi, U.;
- Divya, R.
- Article
44
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 163, doi. 10.1080/19393550802493659
- Article
45
- Journal of Network & Systems Management, 2010, v. 18, n. 3, p. 300, doi. 10.1007/s10922-010-9168-7
- Rossberg, Michael;
- Schaefer, Guenter;
- Strufe, Thorsten
- Article
46
- Journal of Homeland Security & Emergency Management, 2011, v. 8, n. 1, p. 1, doi. 10.2202/1547-7355.1577
- Chittister, Clyde G.;
- Haimes, Yacov Y.
- Article
47
- Discrete Dynamics in Nature & Society, 2012, p. 1, doi. 10.1155/2012/371792
- Jianguo Ren;
- Yonghong Xu;
- Yongchang Zhang;
- Yongquan Dong;
- Guosheng Hao
- Article
48
- Comunicar, 2013, v. 20, n. 40, p. 25, doi. 10.3916/C40-2013-02-02
- Bernal, César;
- Angulo, Félix
- Article
49
- Comunicar, 2013, v. 20, n. 40, p. 25, doi. 10.3916/C40-2013-02-02
- Bernal, César;
- Angulo, Félix
- Article
50
- Media, Culture & Public Relations, 2015, v. 6, n. 1, p. 56
- Antoliš, Krunoslav;
- Mišević, Petar;
- Miličević, Ana
- Article