Works matching DE "COMPUTER software security"
1
- International Journal, 2011, v. 67, n. 1, p. 155
- Article
3
- International Journal on Software Tools for Technology Transfer, 2017, v. 19, n. 5, p. 517, doi. 10.1007/s10009-015-0405-y
- Fedyukovich, Grigory;
- Sery, Ondrej;
- Sharygina, Natasha
- Article
4
- International Journal on Software Tools for Technology Transfer, 2015, v. 17, n. 3, p. 291, doi. 10.1007/s10009-014-0348-8
- Vanoverberghe, Dries;
- Piessens, Frank
- Article
5
- International Journal on Software Tools for Technology Transfer, 2015, v. 17, n. 3, p. 251, doi. 10.1007/s10009-014-0351-0
- Refsdal, Atle;
- Solhaug, Bjørnar;
- Stølen, Ketil
- Article
6
- International Journal on Software Tools for Technology Transfer, 2015, v. 17, n. 3, p. 267, doi. 10.1007/s10009-014-0364-8
- Bürger, Jens;
- Jürjens, Jan;
- Wenzel, Sven
- Article
7
- International Journal on Software Tools for Technology Transfer, 2015, v. 17, n. 3, p. 305, doi. 10.1007/s10009-015-0365-2
- Felderer, Michael;
- Fourneret, Elizabeta
- Article
8
- International Journal on Software Tools for Technology Transfer, 2015, v. 17, n. 3, p. 245, doi. 10.1007/s10009-015-0371-4
- Felderer, Michael;
- Katt, Basel
- Article
9
- Wireless Personal Communications, 2025, v. 140, n. 1, p. 25, doi. 10.1007/s11277-023-10431-2
- Køien, Geir M.;
- Øverlier, Lasse
- Article
10
- Devotion: Journal of Research & Community Service, 2023, v. 4, n. 6, p. 1333, doi. 10.59188/devotion.v4i6.486
- Maulani, Isma Elan;
- Anggraeni, Riska
- Article
11
- Intellectual Property / Dusevne Vlastnictvo, 2021, v. 25, n. 3/4, p. 6
- ONDROVIČOVÁ, Katarína;
- PIVODA, Radomír;
- KŮDELÍKOVÁ, Kristina;
- ŠVEJDA, Jiří
- Article
12
- Bulletin of the National Research Centre, 2023, v. 47, n. 1, p. 1, doi. 10.1186/s42269-023-01096-9
- Elsayed, Ghada;
- Soleit, Elsayed;
- Kayed, Somaya
- Article
13
- Advanced Electronic Materials, 2021, v. 7, n. 12, p. 1, doi. 10.1002/aelm.202100536
- Rajendran, Gokulnath;
- Banerjee, Writam;
- Chattopadhyay, Anupam;
- Aly, Mohamed M. Sabry
- Article
14
- Journal of Network & Information Security, 2021, v. 9, n. 1, p. 1
- Article
15
- Systems, 2023, v. 11, n. 1, p. 49, doi. 10.3390/systems11010049
- Ibrahim, Muhammad Azwan;
- Qamar, Faizan;
- Shukur, Zarina;
- Zainal, Nasharuddin;
- Marzuki, Nazri;
- Siregar, Maria Ulfah
- Article
16
- Journal of Engineering (2314-4912), 2024, v. 2024, p. 1, doi. 10.1155/2024/9962691
- Hussain, Shariq;
- Anwaar, Haris;
- Sultan, Kashif;
- Mahmud, Umar;
- Farooqui, Sherjeel;
- Karamat, Tehmina;
- Toure, Ibrahima Kalil
- Article
17
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6903370
- Li, Yang;
- Kang, Fei;
- Shu, Hui;
- Xiong, Xiaobing;
- Sha, Zihan;
- Sui, Zhonghang
- Article
18
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2834982
- Article
19
- Acta Technica Corviniensis - Bulletin of Engineering, 2024, v. 17, n. 2, p. 45
- DRAGOVIĆ, Rade;
- STANISAVLJEV, Sanja;
- DOBRILOVIĆ, Dalibor;
- DRAGOVIĆ, Dragan;
- MILOŠEV, Vladimir
- Article
20
- Information (2078-2489), 2023, v. 14, n. 7, p. 403, doi. 10.3390/info14070403
- Charmanas, Konstantinos;
- Mittas, Nikolaos;
- Angelis, Lefteris
- Article
21
- InfoM, 2013, n. 48, p. 9
- Nikolić, Aleksandar;
- Sladić, Goran;
- Milosavljević, Branko;
- Konjović, Zora
- Article
22
- International Journal of Interactive Multimedia & Artificial Intelligence, 2024, v. 8, n. 6, p. 120, doi. 10.9781/ijimai.2023.12.002
- Deore, Mahendra;
- Tarambale, Manoj;
- Kumar, Jambi Ratna Raja;
- Sakhare, Sachin
- Article
23
- Advances in Civil Engineering, 2019, p. 1, doi. 10.1155/2019/7450426
- Deng, Langni;
- Zhong, Mengjun;
- Liao, Ling;
- Peng, Lai;
- Lai, Shijin
- Article
24
- IT Professional, 2012, v. 14, n. 6, p. 51, doi. 10.1109/MITP.2012.111
- Article
25
- IEEE Internet Computing, 2015, v. 19, n. 3, p. 72, doi. 10.1109/MIC.2015.64
- Article
26
- IEEE Internet Computing, 2010, v. 14, n. 5, p. 14, doi. 10.1109/MIC.2010.86
- Article
27
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/2998448
- Guo, Junjun;
- Wang, Zhengyuan;
- Zhang, Li;
- Xue, Yang;
- Long, Kai;
- Jing, Xin;
- Cheng, Jing;
- Li, Guiping
- Article
28
- Revista de Ingeniería, 2010, n. 31, p. 109, doi. 10.16924/riua.v0i31.217
- Gómez, Ricardo;
- Pérez, Diego Hernán;
- Donoso, Yezid;
- Herrera, Andrea
- Article
29
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 2, p. 83, doi. 10.54216/JCIM.120206
- Botto-Tobar, Miguel;
- Rehan, Sumaiya;
- Verma, Ravi Prakash
- Article
30
- Journal of Management Information Systems, 2012, v. 29, n. 2, p. 77, doi. 10.2753/MIS0742-1222290204
- Dey, Debabrata;
- Lahiri, Atanu;
- Zhang, Guoying
- Article
31
- Harvard Journal of Law & Public Policy, 2006, v. 30, n. 1, p. 283
- Hahn, Robert W.;
- Layne-Farrar, Anne
- Article
32
- Computers (2073-431X), 2024, v. 13, n. 1, p. 22, doi. 10.3390/computers13010022
- Aladics, Tamás;
- Hegedűs, Péter;
- Ferenc, Rudolf
- Article
33
- Computers (2073-431X), 2018, v. 7, n. 4, p. 49, doi. 10.3390/computers7040049
- Article
34
- Computers (2073-431X), 2018, v. 7, n. 2, p. 31, doi. 10.3390/computers7020031
- Saeed, Ahmed;
- Ahmadinia, Ali;
- Just, Mike
- Article
35
- International Journal of Information Security Science, 2024, v. 13, n. 2, p. 33, doi. 10.55859/ijiss.1455039
- Kağızmandere, Omercan;
- Arslan, Halil
- Article
36
- Technology Innovation Management Review, 2013, p. 59, doi. 10.22215/timreview717
- Emami-Taba, Mahsa;
- Amoui, Mehdi;
- Tahvildari, Ladan
- Article
37
- Economic Annals-XXI / Ekonomìčnij Časopis-XXI, 2021, v. 189, n. 5/6, p. 90, doi. 10.21003/ea.V189-09
- Dziatkovskii, Anton;
- Hryneuski, Uladzimir
- Article
38
- International Journal of Advanced Research in Computer Science, 2023, v. 14, n. 2, p. 1, doi. 10.26483/ijarcs.v14i2.6955
- Umeugo, Wisdom;
- Lowrey, Kimberly;
- Pandya, Shardul Y.
- Article
39
- International Journal of Advanced Research in Computer Science, 2023, v. 14, n. 1, p. 5, doi. 10.26483/ijarcs.v14i1.6949
- Article
40
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 22, doi. 10.26483/ijarcs.v8i7.4152
- Malik, Vinita;
- Singh, Sukhdip;
- Sharma, Aarushi;
- Manchanda, Guarav;
- Malik, Deepesh
- Article
41
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2328
- Mishra, Anshul;
- Agarwal, Devendra;
- Khan, M. H.
- Article
42
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 16
- Ansari, Tarique Jamal;
- Pandey, Dhirendra
- Article
43
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 2, p. 58
- Krishna Deep, T. Gnana;
- Koundinya, V. Venkata;
- Kiran, K. V. D.;
- Reddy, L. S. S.
- Article
44
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 221
- Article
45
- International Journal of Software Engineering & Knowledge Engineering, 2025, v. 35, n. 4, p. 469, doi. 10.1142/S0218194025500123
- Dai, Peng;
- Ma, Xiaoqin;
- Peng, Zebo;
- Zhao, Chen;
- Zhang, Qianjin
- Article
46
- International Journal of Software Engineering & Knowledge Engineering, 2025, v. 35, n. 3, p. 397, doi. 10.1142/S021819402550010X
- Wang, Ziyan;
- Huang, Cheng;
- You, Yang
- Article
47
- International Journal of Software Engineering & Knowledge Engineering, 2024, v. 34, n. 2, p. 239, doi. 10.1142/S0218194023500511
- Chen, Hao;
- Zhou, Shengyang;
- Chen, Chen;
- Dai, Zheng;
- Li, Bixin
- Article
48
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 6, p. 875, doi. 10.1142/S0218194010004980
- KONG, JUN;
- XU, DIANXIANG;
- ZENG, XIAOQIN
- Article
49
- Neural Computing & Applications, 2024, v. 36, n. 25, p. 15869, doi. 10.1007/s00521-024-09819-3
- McLaughlin, Connor;
- Lu, Yi
- Article
50
- Review of Banking & Financial Law, 2021, v. 41, n. 1, p. 124
- Article