Works matching DE "COMPUTER security vulnerabilities"
1
- Mathematics (2227-7390), 2025, v. 13, n. 11, p. 1879, doi. 10.3390/math13111879
- Dahan, Eran;
- Aviv, Itzhak;
- Kiperberg, Michael
- Article
2
- Electronics (2079-9292), 2025, v. 14, n. 10, p. 1931, doi. 10.3390/electronics14101931
- Zhang, Yifan;
- Zhu, Kailong;
- Peng, Jie;
- Lu, Yuliang;
- Chen, Qian;
- Li, Zixiong
- Article
3
- International Journal, 2011, v. 67, n. 1, p. 155
- Article
5
- Government Technology, 2019, v. 32, n. 7, p. 38
- Article
6
- Wireless Personal Communications, 2025, v. 140, n. 3/4, p. 785, doi. 10.1007/s11277-024-11015-4
- Article
7
- Devotion: Journal of Research & Community Service, 2023, v. 4, n. 6, p. 1333, doi. 10.59188/devotion.v4i6.486
- Maulani, Isma Elan;
- Anggraeni, Riska
- Article
8
- International Journal of Energy Research, 2016, v. 40, n. 3, p. 298, doi. 10.1002/er.3356
- Ko, Jongbin;
- Lee, Seokjun;
- Shon, Taeshik
- Article
9
- Cogent Engineering, 2023, v. 10, n. 1, p. 1, doi. 10.1080/23311916.2023.2221962
- Article
10
- International Journal of Distributed & Cloud Computing, 2016, v. 4, n. 2, p. 31
- Guster, Dennis;
- Rice, Erich;
- Farra, Hazem
- Article
11
- Journal of Engineering (2314-4912), 2024, v. 2024, p. 1, doi. 10.1155/2024/9962691
- Hussain, Shariq;
- Anwaar, Haris;
- Sultan, Kashif;
- Mahmud, Umar;
- Farooqui, Sherjeel;
- Karamat, Tehmina;
- Toure, Ibrahima Kalil
- Article
12
- Frontiers in Psychology, 2019, p. N.PAG, doi. 10.3389/fpsyg.2019.00436
- Martín-Perpiñá, Maria de las Mercedes;
- Poch, Ferran Viñas;
- Cerrato, Sara Malo
- Article
13
- Decision Sciences, 2016, v. 47, n. 6, p. 1073, doi. 10.1111/deci.12212
- Sen, Ravi;
- Heim, Gregory R.
- Article
14
- China Business Review, 2014, p. 1
- Article
15
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2304
- Zhou, Jiacheng;
- Liu, Zhenhua;
- Wang, Baocang
- Article
16
- International Journal of Network Management, 2023, v. 33, n. 3, p. 1, doi. 10.1002/nem.2198
- Zeng, Peng;
- Lin, Guanjun;
- Zhang, Jun;
- Zhang, Ying
- Article
17
- Information (2078-2489), 2024, v. 15, n. 4, p. 216, doi. 10.3390/info15040216
- Groppe, Jinghua;
- Groppe, Sven;
- Senf, Daniel;
- Möller, Ralf
- Article
18
- Information (2078-2489), 2024, v. 15, n. 4, p. 214, doi. 10.3390/info15040214
- Branescu, Ioana;
- Grigorescu, Octavian;
- Dascalu, Mihai
- Article
19
- Information (2078-2489), 2023, v. 14, n. 9, p. 497, doi. 10.3390/info14090497
- Fedorchenko, Elena;
- Novikova, Evgenia;
- Fedorchenko, Andrey;
- Verevkin, Sergei
- Article
20
- Information (2078-2489), 2020, v. 11, n. 9, p. 452, doi. 10.3390/info11090452
- Vaccari, Ivan;
- Aiello, Maurizio;
- Cambiaso, Enrico
- Article
21
- Information (2078-2489), 2020, v. 11, n. 1, p. 6, doi. 10.3390/info11010006
- Ghanem, Mohamed C.;
- Chen, Thomas M.
- Article
22
- Information (2078-2489), 2019, v. 10, n. 10, p. 326, doi. 10.3390/info10100326
- Amin, Amr;
- Eldessouki, Amgad;
- Magdy, Menna Tullah;
- Abdeen, Nouran;
- Hindy, Hanan;
- Hegazy, Islam
- Article
23
- Information (2078-2489), 2019, v. 10, n. 7, p. 242, doi. 10.3390/info10070242
- Russo, Pietro;
- Caponi, Alberto;
- Leuti, Marco;
- Bianchi, Giuseppe
- Article
24
- International Journal of Software & Informatics, 2024, v. 14, n. 3, p. 249, doi. 10.21655/ijsi.1673-7288.00332
- Chen, Siran;
- Jingzheng Wu;
- Xiang Ling;
- Tianyue Luo;
- Jiayu Liu;
- Yanjun Wu
- Article
25
- Peer-to-Peer Networking & Applications, 2019, v. 12, n. 5, p. 1216, doi. 10.1007/s12083-019-0716-y
- Nikoloudakis, Yannis;
- Pallis, Evangelos;
- Mastorakis, George;
- Mavromoustakis, Constandinos X.;
- Skianis, Charalabos;
- Markakis, Evangelos K.
- Article
26
- Journal of Database Management, 2020, v. 31, n. 1, p. N.PAG, doi. 10.4018/JDM.2020010103
- Subramanian, Hemang Chamakuzhi;
- Malladi, Suresh
- Article
27
- Public Administration Review, 2022, v. 82, n. 4, p. 771, doi. 10.1111/puar.13493
- Atkins, Sean;
- Lawson, Chappell
- Article
28
- Natural Hazards, 2019, v. 99, n. 1, p. 117, doi. 10.1007/s11069-019-03732-y
- Ovreiu, Adriana Bianca;
- Bărsoianu, Iulian Andrei;
- Nistor, Constantin;
- Nedelea, Alexandru;
- Comănescu, Laura
- Article
30
- Computers (2073-431X), 2025, v. 14, n. 3, p. 98, doi. 10.3390/computers14030098
- de Kraker, Wesley;
- Vranken, Harald;
- Hommersom, Arjen
- Article
31
- Computers (2073-431X), 2020, v. 9, n. 2, p. 48, doi. 10.3390/computers9020048
- Pirry, Conor;
- Marco-Gisbert, Hector;
- Begg, Carolyn
- Article
32
- Computers (2073-431X), 2020, v. 9, n. 2, p. 44, doi. 10.3390/computers9020044
- Obaidat, Muath A.;
- Obeidat, Suhaib;
- Holst, Jennifer;
- Al Hayajneh, Abdullah;
- Brown, Joseph
- Article
33
- Computers (2073-431X), 2018, v. 7, n. 2, p. 31, doi. 10.3390/computers7020031
- Saeed, Ahmed;
- Ahmadinia, Ali;
- Just, Mike
- Article
34
- International Journal of Information Security Science, 2024, v. 13, n. 2, p. 33, doi. 10.55859/ijiss.1455039
- Kağızmandere, Omercan;
- Arslan, Halil
- Article
35
- International Journal of Advanced Research in Computer Science, 2020, v. 11, n. 1, p. 11, doi. 10.26483/ijarcs.v11i1.6502
- Al-Matarneh, Feras Mohammed
- Article
36
- International Journal of Advanced Research in Computer Science, 2019, v. 10, n. 3, p. 71, doi. 10.26483/ijarcs.v10i3.6420
- Article
37
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 581, doi. 10.26483/ijarcs.v8i7.4351
- Kaur, Sukhchain;
- Sharma, Reecha
- Article
38
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 4, p. 277
- Article
39
- DAAAM International Scientific Book, 2019, p. 205, doi. 10.2507/daaam.scibook.2019.16
- LAPKOVA, DORA;
- JENCKOVA, KLARA
- Article
40
- International Journal of Software Engineering & Knowledge Engineering, 2025, v. 35, n. 5, p. 609, doi. 10.1142/S0218194025300027
- Li, Lining;
- Ren, Rong;
- Dong, Jun;
- Zhang, Bing;
- Kang, Xu
- Article
41
- International Journal of Software Engineering & Knowledge Engineering, 2025, v. 35, n. 4, p. 469, doi. 10.1142/S0218194025500123
- Dai, Peng;
- Ma, Xiaoqin;
- Peng, Zebo;
- Zhao, Chen;
- Zhang, Qianjin
- Article
42
- Neural Computing & Applications, 2025, v. 37, n. 6, p. 5121, doi. 10.1007/s00521-024-10797-9
- Do Xuan, Cho;
- Anh, Huynh Nhat
- Article
43
- Neural Computing & Applications, 2024, v. 36, n. 25, p. 15869, doi. 10.1007/s00521-024-09819-3
- McLaughlin, Connor;
- Lu, Yi
- Article
44
- International Journal of Performability Engineering, 2020, v. 16, n. 7, p. 1008, doi. 10.23940/ijpe.20.07.p3.10081018
- Wilhjelm, Carl;
- Kotadiya, Taslima;
- Younis, Awad A.
- Article
45
- International Journal of Performability Engineering, 2019, v. 15, n. 9, p. 2329, doi. 10.23940/ijpe.19.09.p5.23292337
- Yongming Yao;
- Song Huang;
- Cuiyi Feng;
- Chen Liu;
- Chenying Xu
- Article
46
- Multimedia Tools & Applications, 2024, v. 83, n. 39, p. 86707, doi. 10.1007/s11042-024-19682-y
- Article
47
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 368, doi. 10.1049/iet-ifs.2019.0447
- Ingham, Max;
- Marchang, Jims;
- Bhowmik, Deepayan
- Article
48
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 60, doi. 10.1049/iet-ifs.2018.5647
- Article
49
- MIS Quarterly, 2019, v. 43, n. 2, p. 601, doi. 10.25300/MISQ/2019/14751
- Jingguo Wang;
- Zhe Shan;
- Gupta, Manish;
- Rao, H. Raghav
- Article
50
- MIS Quarterly, 2015, v. 39, n. 1, p. 91
- Jingguo Wang;
- Gupta, Manish;
- Rao, H. Raghav
- Article