Works matching DE "COMPUTER user identification"
1
- International Review of Law, Computers & Technology, 2014, v. 28, n. 1, p. 21, doi. 10.1080/13600869.2013.869909
- Article
2
- Personal & Ubiquitous Computing, 2014, v. 18, n. 2, p. 465, doi. 10.1007/s00779-013-0664-0
- Mongay Batalla, Jordi;
- Krawiec, Piotr
- Article
3
- 2014
- Carretero, Jesús;
- García, J.
- Editorial
4
- Internet Pragmatics, 2022, v. 5, n. 1, p. 38, doi. 10.1075/ip.00074.ker
- Kersten, Saskia;
- Lotze, Netaya
- Article
5
- Cogent Engineering, 2020, v. 7, n. 1, p. 1, doi. 10.1080/23311916.2020.1751557
- Aizat, Kydyrbekova;
- Mohamed, Othman;
- Orken, Mamyrbayev;
- Ainur, Akhmediyarova;
- Zhumazhanov, Bagashar;
- Pham, Duc
- Article
6
- Astronomy Reports, 2020, v. 64, n. 9, p. 795, doi. 10.1134/S1063772920100017
- Andreev, A. O.;
- Nefedyev, Yu. A.;
- Demina, N. Yu.;
- Nefediev, L. A.;
- Petrova, N. K.;
- Zagidullin, A. A.
- Article
7
- Traitement du Signal, 2024, v. 41, n. 2, p. 901, doi. 10.18280/ts.410230
- Arepalli, Gopi Suresh;
- Boobalan, Pakkiri
- Article
8
- Ingénierie des Systèmes d'Information, 2025, v. 30, n. 4, p. 891, doi. 10.18280/isi.300406
- George, Dena Nadir;
- Yousif, Noor A.;
- Qassir, Samar Amil
- Article
9
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2021, v. 11, n. 1/2, p. 115
- Шаманіна, Т. В.;
- Павленко, В. Д.
- Article
10
- Frontiers in Psychology, 2017, p. 1, doi. 10.3389/fpsyg.2017.02200
- Silva, Rita R.;
- Chrobot, Nina;
- Newman, Eryn;
- Schwarz, Norbert;
- Topolinski, Sascha
- Article
11
- Journal of Information Technology & Applications, 2013, v. 3, n. 1, p. 27, doi. 10.7251/JIT1301027M
- Milenković, Ivan;
- Latinović, Olja;
- Simić, Dejan
- Article
12
- 2021
- Andriopoulos, Athanasios;
- Olsson, Erik M G;
- Sylvén, Ylva Hägg;
- Sjöström, Jonas;
- Johansson, Birgitta;
- Essen, Louise von;
- Grönqvist, Helena;
- Hägg Sylvén, Ylva;
- von Essen, Louise
- journal article
13
- Journal of Medical Internet Research, 2019, v. 21, n. 8, p. N.PAG, doi. 10.2196/12314
- Giroux, Dominique;
- Tremblay, Mélanie;
- Latulippe, Karine;
- Provencher, Véronique;
- Poulin, Valérie;
- Giguere, Anik;
- Dubé, Véronique;
- Sévigny, Andrée;
- Guay, Manon;
- Ethier, Sophie;
- Carignan, Maude
- Article
14
- International Journal of Network Management, 2019, v. 29, n. 3, p. N.PAG, doi. 10.1002/nem.2049
- Phan, Tien D.;
- Zincir‐Heywood, Nur
- Article
15
- Information (2078-2489), 2019, v. 10, n. 6, p. 210, doi. 10.3390/info10060210
- Berbecaru, Diana;
- Lioy, Antonio;
- Cameroni, Cesare
- Article
16
- International Journal of Advances in Soft Computing & Its Applications, 2015, v. 7, n. 3, p. 85
- Siaw-Hong Liew;
- Yun-Huoy Choo;
- Yin Fen Low;
- Yusoh, Zeratul Izzah Mohd
- Article
17
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 3, p. 1458, doi. 10.1007/s12083-020-01031-z
- Xue, Mingfu;
- He, Can;
- Wang, Jian;
- Liu, Weiqiang
- Article
18
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 52, doi. 10.1109/MIC.2014.104
- West, Andrew G.;
- Aviv, Adam J.
- Article
19
- Computers (2073-431X), 2024, v. 13, n. 4, p. 103, doi. 10.3390/computers13040103
- Bansal, Priya;
- Ouda, Abdelkader
- Article
20
- Journal of Software Engineering Research & Development, 2018, v. 6, n. 1, p. 1, doi. 10.1186/s40411-017-0045-x
- N. Damasceno, Carlos Diego;
- Masiero, Paulo C.;
- Simao, Adenilso
- Article
21
- International Journal of Science, Innovation & New Technology, 2012, p. 1
- ARANITASI, Marin;
- SHEME, Enida;
- IBRO, Marsida
- Article
22
- Creativity & Innovation Management, 2020, v. 29, n. 3, p. 380, doi. 10.1111/caim.12380
- Schweisfurth, Tim G.;
- Raasch, Christina
- Article
23
- International Journal of Advanced Research in Computer Science, 2023, v. 14, n. 2, p. 8, doi. 10.26483/ijarcs.v14i2.6952
- Article
24
- International Journal of Advanced Research in Computer Science, 2020, v. 11, p. 131
- Vinay Kumar M.;
- Lalu Prasad M.;
- Shreyaa, Kolhapuram;
- Manasa C. H.;
- Kumar, Resham Sundar
- Article
25
- Journal of Information System Security, 2015, v. 11, n. 3, p. 185
- Article
26
- Journal of Electrical & Computer Engineering, 2016, p. 1, doi. 10.1155/2016/8637260
- Liu, Jianzheng;
- Fang, Chunlin;
- Wu, Chao
- Article
27
- International Journal of Software Engineering & Knowledge Engineering, 2018, v. 28, n. 2, p. 175, doi. 10.1142/S0218194018400028
- Bailing Wang;
- Hongri Liu;
- Kaixin Wang;
- Guodong Xin;
- Jia Song
- Article
28
- PLoS ONE, 2014, v. 9, n. 12, p. 1, doi. 10.1371/journal.pone.0114518
- Zulkifley, Mohd Asyraf;
- Mustafa, Mohd Marzuki;
- Hussain, Aini;
- Mustapha, Aouache;
- Ramli, Suzaimah
- Article
29
- PLoS ONE, 2013, v. 8, n. 12, p. 1, doi. 10.1371/journal.pone.0081976
- Munoz-Hernandez, Mario Diego;
- Garcia-Hernandez, Jose Juan;
- Morales-Sandoval, Miguel
- Article
30
- International Journal of Performability Engineering, 2019, n. 11, p. 3024, doi. 10.23940/ijpe.19.11.p22.30243030
- Guozhong Dong;
- Bei Li;
- Xinhong Wei;
- Tao Qin
- Article
31
- Logic Journal of the IGPL, 2016, v. 24, n. 6, p. 883, doi. 10.1093/jigpal/jzw043
- DE-LA-PEÑA-SORDO, JORGE;
- PASTOR-LÓPEZ, IKER;
- UGARTE-PEDRERO, XABIER;
- SANTOS, IGOR;
- BRINGAS, PABLO G.
- Article
32
- Ergonomics in Design, 2013, v. 21, n. 4, p. 31, doi. 10.1177/1064804613497958
- Article
33
- 2016
- Lynskey, Jeff;
- River, Powell
- Letter to the Editor
34
- Psychology & Marketing, 2018, v. 35, n. 4, p. 307, doi. 10.1002/mar.21088
- Silva, Rita R.;
- Topolinski, Sascha
- Article
35
- International Journal of Advanced Manufacturing Technology, 2013, v. 69, n. 9-12, p. 2261, doi. 10.1007/s00170-013-5200-x
- Ahmadzadeh, Farzaneh;
- Lundberg, Jan;
- Strömberg, Thomas
- Article
36
- 2019
- Guo, Guan N;
- Jonnagaddala, Jitendra;
- Farshid, Sanjay;
- Huser, Vojtech;
- Reich, Christian;
- Liaw, Siaw-Teng
- journal article
37
- ASA University Review, 2013, v. 7, n. 2, p. 91
- Article
38
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5533417
- Zeng, Wenjing;
- Tang, Rui;
- Wang, Haizhou;
- Chen, Xingshu;
- Wang, Wenxian
- Article
39
- Journal of Information Assurance & Security, 2016, v. 11, n. 4, p. 179
- Chaabane, Faten;
- Charfeddine, Maha;
- Amar, Chokri Ben
- Article
40
- Journal of Information Assurance & Security, 2014, v. 9, n. 4, p. 186
- Damasceno, Marcelo;
- Canuto, A. M. P.
- Article
41
- Journal of Information Assurance & Security, 2014, v. 9, n. 2, p. 104
- Vila, Jordi Aguilà;
- Serna, Jetzabel;
- Medina, Manel;
- Sfakianakis, Andreas
- Article
42
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2019, v. 71, n. 1, p. 11
- Roșca, Cosmina-Mihaela;
- Nedelcu, Andrei Sebastian
- Article
43
- Parasites & Vectors, 2019, v. 12, n. 1, p. N.PAG, doi. 10.1186/s13071-019-3709-z
- Yang, Tianci;
- Lin, Yili;
- Li, Cheng;
- Xie, Guojun;
- Qian, Jun;
- Yang, Jianmin;
- Ma, Xiang;
- Wang, Limin;
- Qi, Runzi;
- Yu, Bin;
- Zheng, Wei;
- Wu, Zhonghua;
- Zhang, Xiaobin;
- Cao, Xuechun;
- Li, Jie
- Article
44
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 3, p. 270, doi. 10.1109/TDSC.2013.2297709
- Ceccarelli, Andrea;
- Montecchi, Leonardo;
- Brancati, Francesco;
- Lollini, Paolo;
- Marguglio, Angelo;
- Bondavalli, Andrea
- Article
45
- International Journal of Emerging Technologies in Learning, 2019, v. 14, n. 9, p. 21, doi. 10.3991/ijet.v14i09.9854
- Kapusta, Jozef;
- Munk, Michal;
- Halvoník, Dominik;
- Drlík, Martin
- Article
46
- Social Behavior & Personality: an international journal, 2016, v. 44, n. 8, p. 1371, doi. 10.2224/sbp.2016.44.8.1371
- Article
47
- Electronics Letters (Wiley-Blackwell), 2018, v. 54, n. 21, p. 1212, doi. 10.1049/el.2018.5189
- Kang, I. H.;
- Hong, M. T.;
- Bae, B. S.
- Article
48
- Data Science & Engineering, 2016, v. 1, n. 3, p. 161, doi. 10.1007/s41019-016-0020-2
- Badsha, Shahriar;
- Yi, Xun;
- Khalil, Ibrahim
- Article
49
- IT: Information Technology, 2015, v. 57, n. 6, p. 366, doi. 10.1515/itit-2015-0015
- Article
50
- I-com, 2025, v. 24, n. 1, p. 125, doi. 10.1515/icom-2024-0057
- Sauer, Max;
- Becker, Christoph;
- Kneis, Lukas;
- Oberweis, Andreas;
- Pfeifer, Simon;
- Stark, Akim;
- Sürmeli, Jan
- Article