Works matching DE "COMPUTER virus prevention"
1
- TechTrends: Linking Research & Practice to Improve Learning, 2006, v. 50, n. 4, p. 3, doi. 10.1007/s11528-006-0003-7
- Article
2
- International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 2, p. 147, doi. 10.1007/s10009-013-0290-1
- Article
3
- IEEE Internet Computing, 2009, v. 13, n. 6, p. 31, doi. 10.1109/MIC.2009.128
- Ayuso, Pablo Neira;
- Gasca, Rafael M.;
- Lefèvre, Laurent
- Article
4
- ComputerWorld Hong Kong, 2011, v. 28, n. 5, p. 86
- Article
5
- ComputerWorld Hong Kong, 2010, v. 27, n. 9, p. 46
- Article
6
- ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 84
- Article
7
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 402
- Rani, Rajni;
- Kaur, Gurjinder
- Article
8
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 1, p. 442
- Joshi, Milind. J.;
- Patil, Bhaskar V.
- Article
9
- Asia Weekly, 2008, v. 2, n. 38, p. 22
- Article
10
- Strategic Finance, 2003, v. 84, n. 7, p. 53
- Article
11
- Strategic Finance, 2002, v. 84, n. 3, p. 32
- Article
12
- Strategic Finance, 2002, v. 84, n. 2, p. 56
- Article
13
- Strategic Finance, 1999, v. 81, n. 5, p. 38
- Article
14
- Journal of the CPA Practitioner, 2010, v. 2, n. 3, p. 7
- Article
15
- Journal of the CPA Practitioner, 2010, v. 2, n. 1, p. 9
- Article
16
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 424, doi. 10.1109/TDSC.2008.74
- Kinder, Johannes;
- Katzenbeisser, Stefan;
- Schallhart, Christian;
- Veith, Helmut
- Article
17
- Boston Review, 2008, v. 33, n. 2, p. 7
- Article
18
- Journal of Cyber Security Technology, 2018, v. 2, n. 1, p. 37, doi. 10.1080/23742917.2018.1485415
- Muthalagu, Raja;
- Jain, Subeen
- Article
19
- Computer Science & Telecommunications, 2015, v. 46, n. 2, p. 36
- Article
20
- Journal of Systems Integration (1804-2724), 2013, v. 4, n. 3, p. 48
- Article
21
- CPA Journal, 1994, v. 64, n. 8, p. 74
- Smith, L. Murphy;
- Forgione, Dana
- Article
22
- Teacher Librarian, 2013, v. 41, n. 2, p. 64
- Article
23
- Teacher Librarian, 2003, v. 30, n. 4, p. 46
- Article
24
- International Journal of Online Engineering, 2017, v. 13, n. 7, p. 4, doi. 10.3991/ijoe.v13i07.7273
- Xiao-bin Shu;
- Cai-hong Liu;
- Chun-xia Jiao;
- Qin Wang;
- Hongfeng Yin
- Article
25
- Quantum Information Processing, 2014, v. 13, n. 3, p. 805, doi. 10.1007/s11128-013-0692-8
- Yang, Yu-Guang;
- Sun, Si-Jia;
- Xu, Peng;
- Tian, Ju
- Article
26
- Quantum Information Processing, 2014, v. 13, n. 3, p. 781, doi. 10.1007/s11128-013-0689-3
- Yang, Chun-Wei;
- Hwang, Tzonelih
- Article
27
- Journal of Archival Organization, 2018, v. 15, n. 1/2, p. 1, doi. 10.1080/15332748.2019.1609311
- Donaldson, Devan Ray;
- Bell, Laura
- Article
28
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 65
- DEZUN DONG;
- MO LI;
- YUNHAO LIU;
- XIANGKE LIAO
- Article
29
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 79
- GU-HSIN LAI;
- CHEN-SEN OUYANG;
- CHIA-MEI CHEN
- Article
30
- European Physical Journal B: Condensed Matter, 2017, v. 90, n. 1, p. 1, doi. 10.1140/epjb/e2016-70334-9
- Xia, Lingling;
- Jiang, Guoping;
- Song, Yurong;
- Song, Bo
- Article
31
- Strategic Finance, 2007, v. 88, n. 7, p. 55
- Article
32
- Chinese Law & Government, 2016, v. 48, n. 1, p. 88, doi. 10.1080/00094609.2015.1048141
- Article
33
- Trends & Issues in Crime & Criminal Justice, 2012, n. 433, p. 1
- Article
34
- Internal Auditor, 2010, v. 67, n. 1, p. 22
- Article
35
- Military Engineer / Hadmérnök, 2012, v. 7, n. 2, p. 242
- Article
36
- Annals. Computer Science Series, 2014, v. 12, n. 2, p. 39
- Subhash, P.;
- Ramachandram, S.
- Article
37
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 103, doi. 10.1080/15501320802575278
- Wang, Wei;
- Xie, Ming;
- Luo, Daisheng;
- Fang, Yong
- Article
38
- Abstract & Applied Analysis, 2014, p. 1, doi. 10.1155/2014/731856
- Jianguo Ren;
- Yonghong Xu;
- Jiming Liu
- Article
39
- Nature, 2009, v. 458, n. 7241, p. 945, doi. 10.1038/458945a
- Article
40
- MIS Quarterly, 1992, v. 16, n. 2, p. 173, doi. 10.2307/249574
- Loch, Karen D.;
- Carr, Houston H.;
- Warkentin, Merrill E.
- Article
41
- International Journal of Recent Research Aspects, 2018, v. 5, n. 1, p. 236
- Reddy, E. Madhusudhana;
- Haritha, V.
- Article
42
- International Journal of Information Security, 2015, v. 14, n. 1, p. 1, doi. 10.1007/s10207-014-0242-0
- Han, Kyoung;
- Lim, Jae;
- Kang, Boojoong;
- Im, Eul
- Article
43
- International Journal of Information Security, 2011, v. 10, n. 5, p. 285, doi. 10.1007/s10207-011-0130-9
- Chang, Ee-Chien;
- Lu, Liming;
- Wu, Yongzheng;
- Yap, Roland;
- Yu, Jie
- Article
44
- Applications & Applied Mathematics, 2015, v. 10, n. 2, p. 919
- Handam, Ali H.;
- Freihat, Asad A.
- Article
45
- Security & Communication Networks, 2012, v. 5, n. 8, p. 917, doi. 10.1002/sec.366
- Kim, Do Hoon;
- Lee, Taek;
- Kang, Jaewoo;
- Jeong, Hyunchoel;
- In, Hoh Peter
- Article
46
- Behaviour & Information Technology, 2008, v. 27, n. 5, p. 445, doi. 10.1080/01449290600879344
- Lee, Doohwang;
- Larose, Robert;
- Rifon, Nora
- Article
47
- International Review on Computers & Software, 2007, v. 2, n. 2, p. 190
- Azimzadeh, F.;
- Khatum, S.;
- Ali, B. M.
- Article
48
- Financial Executive, 2005, v. 21, n. 2, p. 10
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
49
- Financial Executive, 2004, v. 20, n. 6, p. 36
- Article
50
- Financial Executive, 2003, v. 19, n. 9, p. 49
- Article