Works matching DE "COMPUTER security software"
1
- Journal of Web Engineering, 2025, v. 24, n. 3, p. 383, doi. 10.13052/jwe1540-9589.2433
- Pascual Caceres, Cinthia Paola;
- Berná Martínez, José Vicente;
- Almaral Martínez, María Esther;
- Muñoz, Lucía Arnau
- Article
2
- International Review of Law, Computers & Technology, 2010, v. 24, n. 1, p. 101, doi. 10.1080/13600861003637693
- Cannataci, JosephA.;
- Bonnici, JeannePia Mifsud
- Article
5
- International Journal of Computing & ICT Research, 2014, v. 8, n. 2, p. 32
- Mshangi, Maduhu;
- Ngemera Nfuka, Edephonce;
- Sanga, Camilius
- Article
6
- Python Papers, 2010, v. 5, n. 3, p. 1
- Article
7
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 15, doi. 10.1007/s12083-012-0125-y
- Pu, Qiong;
- Wang, Jian;
- Wu, Shuhua;
- Fu, Ji
- Article
8
- IEEE Internet Computing, 2015, v. 19, n. 1, p. 80, doi. 10.1109/MIC.2015.3
- Herzberg, Amir;
- Shulman, Haya
- Article
9
- IEEE Internet Computing, 2010, v. 14, n. 4, p. 58, doi. 10.1109/MIC.2010.29
- Article
10
- Technology & Health Care, 2015, v. 23, p. S139, doi. 10.3233/THC-150946
- Yang Shi;
- Hongfei Fan;
- Guoyue Xiong
- Article
14
- ComputerWorld Hong Kong, 2017, p. 5
- Article
15
- ComputerWorld Hong Kong, 2016, p. 38
- Article
16
- ComputerWorld Hong Kong, 2014, p. 41
- Article
17
- ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 83
- Article
18
- ComputerWorld Hong Kong, 2010, v. 26, n. 4, p. 18
- Article
19
- ComputerWorld Hong Kong, 2007, v. 24, n. 11, p. 48
- Article
20
- Journal of Supercomputing, 2013, v. 64, n. 3, p. 1075, doi. 10.1007/s11227-011-0683-4
- Wang, Guojun;
- Du, Qiushuang;
- Zhou, Wei;
- Liu, Qin
- Article
21
- Journal of Supercomputing, 2007, v. 39, n. 2, p. 113, doi. 10.1007/s11227-007-0107-7
- Obimbo, Charlie;
- Salami, Behzad
- Article
22
- Journal of Management Information Systems, 2008, v. 25, n. 1, p. 49, doi. 10.2753/MIS0742-1222250103
- Abbasi, Ahmed;
- Hsinchun Chen;
- Nunamaker Jr., Jay F.
- Article
23
- Intel Technology Journal, 2014, v. 18, n. 4, p. 198
- Nagisetty, Ramune;
- Booth, Cory
- Article
24
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- Edwards, Jonathan;
- Grewal, Ken;
- LeMay, Michael;
- Robinson, Scott H.;
- Sahita, Ravi;
- Woodward, Carl
- Article
25
- Intel Technology Journal, 2014, v. 18, n. 4, p. 162
- Bhargav-Spantzel, Abhilasha
- Article
26
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- Dmitrienko, Alexandra;
- Liebchen, Christopher;
- Rossow, Christian;
- Sadeghi, Ahmad-Reza
- Article
27
- Intel Technology Journal, 2014, v. 18, n. 4, p. 98
- Whitelam, Cameron;
- Bourlai, Thirimachos
- Article
28
- Intel Technology Journal, 2014, v. 18, n. 4, p. 80
- Article
29
- Intel Technology Journal, 2014, v. 18, n. 4, p. 46
- Cornelius, Cory;
- Gutierrez, Christopher N.
- Article
30
- Intel Technology Journal, 2009, v. 13, n. 2, p. 96
- Brickell, Ernie;
- Jiangtao Li
- Article
31
- Intel Technology Journal, 2009, v. 13, n. 2, p. 80
- Walker, Jesse;
- Kounavis, Michael;
- Gueron, Shay;
- Graunke, Gary
- Article
32
- Information & Communications Technology Law, 2011, v. 20, n. 2, p. 83, doi. 10.1080/13600834.2011.578925
- Article
33
- Computers (2073-431X), 2019, v. 8, n. 4, p. 80, doi. 10.3390/computers8040080
- Lescisin, Michael;
- Mahmoud, Qusay H.;
- Cioraca, Anca
- Article
34
- International Journal of Information Security Science, 2017, v. 6, n. 4, p. 70
- Ilter, Murat Burhan;
- Cenk, Murat
- Article
35
- Systémová Integrace, 2013, v. 20, n. 3, p. 63
- Article
36
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 2, p. 19, doi. 10.26483/ijarcs.v9i2.5534
- Nath, Ratnadeep;
- Saha, Bishal;
- Laskar, Aminullah;
- Majumder, Sudipta
- Article
37
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1852
- Sharma, Aditi;
- Poriye, Monika;
- Kumar, Vinod
- Article
38
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1482
- Kumar, Pawan;
- Jangra, Surender;
- Singh, Sawtantar
- Article
39
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 372
- Bhat, Krishnaraj;
- Mahto, Dindayal;
- Yadav, Dilip Kumar
- Article
40
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 5, p. 190
- Kaur Cheema, Prabhjot;
- Kaur, Kamaljit
- Article
41
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 3, p. 206
- Article
42
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 3, p. 238
- Mandal, J. K.;
- Khondekar Lutful Hassan
- Article
43
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 1, p. 442
- Joshi, Milind. J.;
- Patil, Bhaskar V.
- Article
44
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 70
- Article
45
- International Journal of Software Engineering & Knowledge Engineering, 2016, v. 26, n. 2, p. 183, doi. 10.1142/S0218194016500091
- Tuglular, Tugkan;
- Belli, Fevzi;
- Linschulte, Michael
- Article
46
- Annals of the University Dunarea de Jos of Galati Fascicle III: Electrotechnics, Electronics, Automatic Control & Informatics, 2011, v. 34, n. 1, p. 1
- Article
47
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2831, doi. 10.23940/ijpe.18.11.p29.28312841
- Haiyan Sun;
- Zengyu Cai;
- Jianwei Zhang;
- Ling Zhang;
- Yong Gan
- Article
48
- Strategic Finance, 2004, v. 85, n. 9, p. 56
- Article
49
- Strategic Finance, 2004, v. 85, n. 8, p. 54
- Article
50
- Strategic Finance, 2004, v. 85, n. 8, p. 55
- Article