Works matching DE "COMPUTER security research"
1
- International Review of Law, Computers & Technology, 2006, v. 20, n. 3, p. 239, doi. 10.1080/13600860600852119
- Article
2
- Informing Science, 2013, v. 16, p. 1
- Lixuan Zhang;
- Pavur, Robert;
- York, Paul;
- Amos, Clinton
- Article
3
- Issues in Science & Technology, 2001, v. 18, n. 2, p. 43
- Bonvillian, William B.;
- Sharp, Kendra V.
- Article
4
- Comunicar, 2013, v. 20, n. 40, p. 25, doi. 10.3916/C40-2013-02-02
- Bernal, César;
- Angulo, Félix
- Article
5
- Comunicar, 2013, v. 20, n. 40, p. 25, doi. 10.3916/C40-2013-02-02
- Bernal, César;
- Angulo, Félix
- Article
6
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
- Article
7
- International Journal of Software & Informatics, 2014, v. 8, n. 2, p. 167
- Article
8
- International Journal of Software & Informatics, 2014, v. 13, n. 1, p. 95
- Gofman, Mikhail I.;
- Ping Yang
- Article
9
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 628, doi. 10.1007/s12083-012-0181-3
- Choi, Yungho;
- Kim, Lark-Kyo;
- Ahn, Hyungkeun;
- Park, Neungsoo
- Article
10
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 710, doi. 10.1007/s12083-012-0194-y
- Article
11
- Australasian Journal of Information Systems, 2014, v. 18, n. 3, p. 193, doi. 10.3127/ajis.v18i3.1052
- Article
12
- Journal of Management Information Systems, 2012, v. 29, n. 3, p. 117, doi. 10.2753/MIS0742-1222290304
- Hui, Kai-Lung;
- Hui, Wendy;
- Yue, Wei T.
- Article
13
- Journal of Management Information Systems, 2011, v. 28, n. 2, p. 203, doi. 10.2753/MIS0742-1222280208
- Guo, Ken H.;
- Yuan, Yufei;
- Archer, Norman P.;
- Connelly, Catherine E.
- Article
14
- Journal of Management Information Systems, 2010, v. 27, n. 2, p. 189, doi. 10.2753/MIS0742-1222270206
- Mai, Bin;
- Menon, Nirup M.;
- Sarkar, Sumit
- Article
15
- Journal of Information Systems, 2012, v. 26, n. 2, p. 71, doi. 10.2308/isys-50244
- Smith, Antoinette L.;
- Baxter, Ryan J.;
- Boss, Scott R.;
- Hunton, James E.
- Article
16
- Intel Technology Journal, 2014, v. 18, n. 2, p. 34
- Article
17
- Technology Innovation Management Review, 2014, p. 35, doi. 10.22215/timreview774
- Article
18
- International Journal of Advanced Research in Computer Science, 2015, v. 6, n. 5, p. 63
- Article
19
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 5, p. 34
- Kumar Singh, Umesh;
- Phuleria, Kailash;
- Sharma, Shailja;
- Goswami, D. N.
- Article
20
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 11, p. 104
- Raghuvamshi, Archana;
- Premchand, P.
- Article
21
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 11, p. 137
- Sharma, Paresh D.;
- Gupta, Hitesh
- Article
22
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 11, p. 84
- Rai, Anjul K. S.;
- Sharma, Samidha D.
- Article
23
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 11, p. 58
- Article
24
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 9, p. 40
- Arastouie, Narges;
- Arastooie, Naeemeh;
- Salimi, Elham;
- Soltanali, Saeed
- Article
25
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 9, p. 104
- Bharti, Abhishek Kumar;
- Goyal, Maggi;
- Chaudhary, Manoj
- Article
26
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 305
- Sridevi, R.;
- Chattemvelli, Rajan
- Article
27
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 252
- Article
28
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 249
- V., Kalaichelvi;
- Chandrasekaran, R. M.
- Article
29
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 15
- Al-Husainy, Mohammed Abbas Fadhil
- Article
30
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 70
- Article
31
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 297
- Yawale, Rutuja R.;
- Rode, S. V.
- Article
32
- Journal of Virtual Worlds Research, 2014, v. 7, n. 1, p. 1, doi. 10.4101/jvwr.v7i1.7067
- Pridmore, Jeannie;
- Overocker, John
- Article
33
- DLSU Business & Economics Review, 2014, v. 24, n. 1, p. 96
- Article
34
- MIS Quarterly, 2011, v. 35, n. 2, p. 397, doi. 10.2307/23044049
- Chen, Pei-yu;
- Kataria, Gaurav;
- Krishnan, Ramayya
- Article
35
- Management Science, 2006, v. 52, n. 10, p. 1610, doi. 10.1287/mnsc.1060.0562
- Kadane, Joseph B.;
- Krishnan, Ramayya;
- Shmueli, Galit
- Article
36
- Information Systems Management, 2016, v. 33, n. 1, p. 30, doi. 10.1080/10580530.2015.1117868
- Article
37
- Journal of the American Medical Informatics Association, 2011, v. 18, p. i13, doi. 10.1136/amiajnl-2010-000082
- Haggstrom, David A.;
- Saleem, Jason J.;
- Russ, Alissa L.;
- Jones, Josette;
- Russell, Scott A.;
- Chumbler, Neale R.
- Article
38
- Journal of the American Medical Informatics Association, 2010, v. 17, n. 2, p. 148, doi. 10.1136/jamia.2009.000232
- Emam, Khaled El;
- Neri, Emilio;
- Jonker, Elizabeth;
- Sokolova, Marina;
- Peyton, Liam;
- Neisa, Angelica;
- Scassa, Teresa
- Article
39
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 6, p. 15
- Singh, Yudhvir;
- Siwach, Vikas;
- Aggarwal, Divya
- Article
40
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 4, p. 37
- Pahwa, Bharti;
- Shipra;
- Ratra, Jyoti;
- Chauhan, Mahesh
- Article
41
- ICTACT Journal on Soft Computing, 2014, v. 4, n. 4, p. 787, doi. 10.21917/ijsc.2014.0112
- Article
42
- Telecommunication Systems, 2013, v. 53, n. 1, p. 19, doi. 10.1007/s11235-013-9672-7
- Du, Ye;
- Zhang, Ruhui;
- Li, Meihong
- Article
43
- Annals of 'Constantin Brancusi' University of Targu-Jiu. Economy Series / Analele Universităţii 'Constantin Brâncuşi' din Târgu-Jiu Seria Economie, 2015, p. 291
- RĂDULESCU, CRISTINA-MARIA
- Article
44
- ISeCure, 2013, v. 5, n. 2, p. 119
- Javadi, Seyyed Ahmad;
- Amini, Morteza
- Article
45
- ISeCure, 2013, v. 5, n. 2, p. 74
- Avizheh, Sepideh;
- Assar, Maryam Rajabzadeh;
- Salmasizadeh, Mahmoud
- Article
46
- ISeCure, 2013, v. 5, n. 2, p. 209
- Azmi, Reza;
- Pishgoo, Boshra
- Article
47
- Folklore Forum, 2013, p. 260
- Nassar, Nader;
- Miller, Grant
- Article
48
- Folklore Forum, 2013, p. 270
- Abdelwahab, Sara;
- Abraham, Ajith
- Article
49
- Journal of Empirical Research on Human Research Ethics, 2011, v. 6, n. 2, p. 71, doi. 10.1525/jer.2011.6.2.71
- BUCHANAN, ELIZABETH;
- AYCOCK, JOHN;
- DEXTER, SCOTT;
- DITTRICH, DAVID;
- HVIZDAK, ERIN
- Article
50
- Statistical Analysis & Data Mining, 2015, v. 8, n. 5/6, p. 353, doi. 10.1002/sam.11296
- Sexton, Joseph;
- Storlie, Curtis;
- Neil, Joshua
- Article