Works matching DE "CYBER intelligence (Computer security)"
2
- Chinese Journal of International Law, 2019, v. 18, n. 1, p. 1, doi. 10.1093/chinesejil/jmz003
- Article
3
- Knowledge & Information Systems, 2020, v. 62, n. 7, p. 2917, doi. 10.1007/s10115-020-01452-5
- Mohasseb, Alaa;
- Aziz, Benjamin;
- Jung, Jeyong;
- Lee, Julak
- Article
4
- Scientometrics, 2019, v. 121, n. 2, p. 1189, doi. 10.1007/s11192-019-03222-9
- Abbas, Naveed Naeem;
- Ahmed, Tanveer;
- Shah, Syed Habib Ullah;
- Omar, Muhammad;
- Park, Han Woo
- Article
5
- Frontiers in Health Informatics, 2024, v. 13, n. 4, p. 1158
- Shanthi, R.;
- Sandhiyaa, S.;
- Kopperundevi, N.;
- A., Jasvant Ram.;
- Kavitha, T.;
- Suresh, D.
- Article
6
- Sydney Papers, 2023, n. 60, p. 1
- Article
7
- Sydney Papers, 2023, n. 60, p. 1
- Article
8
- Journal of Management Information Systems, 2024, v. 41, n. 1, p. 236, doi. 10.1080/07421222.2023.2301178
- Ampel, Benjamin M.;
- Samtani, Sagar;
- Zhu, Hongyi;
- Chen, Hsinchun;
- Nunamaker Jr., Jay F.
- Article
9
- Journal of Management Information Systems, 2020, v. 37, n. 3, p. 694, doi. 10.1080/07421222.2020.1790186
- Ebrahimi, Mohammadreza;
- Nunamaker, Jay F.;
- Chen, Hsinchun
- Article
10
- ISSA Journal, 2021, v. 19, n. 7, p. 16
- Article
11
- ISSA Journal, 2021, v. 19, n. 1, p. 12
- Article
12
- ISSA Journal, 2020, v. 18, n. 1, p. 35
- Article
13
- ISSA Journal, 2020, v. 18, n. 1, p. 13
- Article
14
- ISSA Journal, 2020, v. 18, n. 1, p. 12
- Ciappelli, Marco;
- Martin, Sean
- Article
15
- ISSA Journal, 2019, v. 17, n. 12, p. 13
- Article
16
- ISSA Journal, 2019, v. 17, n. 10, p. 14
- Article
17
- ISSA Journal, 2019, v. 17, n. 9, p. 24
- Article
18
- ISSA Journal, 2019, v. 17, n. 9, p. 3
- Article
19
- ISSA Journal, 2019, v. 17, n. 8, p. 18
- Igonor, Andy;
- Forbes, Ray;
- McCombs, Jonathan
- Article
20
- ISSA Journal, 2019, v. 17, n. 8, p. 8
- Article
21
- ISSA Journal, 2018, v. 16, n. 4, p. 8
- Article
22
- Malaysian Journal of Computer Science, 2019, v. 32, n. 3, p. 221, doi. 10.22452/mjcs.vol32no3.4
- Rahim, Noor Hayani Abd;
- Hamid, Suraya;
- Kiah, Laiha Mat
- Article
23
- Ukrainian Scientific Journal of Information Security, 2020, v. 26, n. 1, p. 28, doi. 10.18372/2225-5036.26.14667
- Kuznietsova, Tetyana;
- Chyrkov, Artem
- Article
24
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 2, p. 110, doi. 10.18372/2225-5036.25.13841
- Milov, Oleksandr;
- Kazakova, Nadiia;
- Milczarski, Piotr;
- Korol, Olha
- Article
25
- Technology Innovation Management Review, 2020, v. 10, n. 4, p. 48, doi. 10.22215/timreview/1346
- Article
26
- Technology Innovation Management Review, 2020, v. 10, n. 2, p. 62, doi. 10.22215/timreview/1329
- Bailetti, Tony;
- Craigen, Daniel
- Article
27
- Singidunum Journal of Applied Sciences, 2014, p. 687, doi. 10.15308/SInteZa-2014-687-692
- Article
28
- Strategic Impact, 2020, v. 75, n. 2, p. 25
- IONIŢĂ, Crăior-Constantin
- Article
29
- Hemispheres, 2020, v. 43, p. 75
- Article
30
- International Journal of Electrical & Computer Engineering (2088-8708), 2020, v. 10, n. 5, p. 4937, doi. 10.11591/ijece.v10i5.pp4937-4955
- Al-Zahrani, Mohammed Saeed
- Article
31
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 6, p. 4423, doi. 10.11591/ijece.v8i6.pp4423-4431
- Dazahra, M. N.;
- Elmariami, F.;
- Belfqih, A.;
- Boukherouaa, J.
- Article
32
- Middle East Report, 2023, n. 307/308, p. 7
- Article
33
- International Journal of Network Management, 2025, v. 35, n. 3, p. 1, doi. 10.1002/nem.70014
- Cunha Camargo, Arthur Vinícius;
- Granville, Lisandro;
- Bertholdo, Leandro M.
- Article
34
- Public Manager, 2017, p. 1
- Article
35
- eLearning & Software for Education, 2019, v. 4, p. 53, doi. 10.12753/2066-026X-18-222
- Article
36
- eLearning & Software for Education, 2019, v. 4, p. 20, doi. 10.12753/2066-026X-18-217
- DAN-SUTEU, Stefan-Antonio
- Article
37
- eLearning & Software for Education, 2019, v. 2, p. 306, doi. 10.12753/2066-026X-19-113
- NEVMERZHITSKAYA, Julia;
- NORVANTO, Elisa;
- VIRAG, Csaba
- Article
38
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3949292
- Gao, Chungang;
- Wang, Yongjie;
- Xiong, Xinli
- Article
39
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2775249
- He, Ying;
- Maglaras, Leandros;
- Aliyu, Aliyu;
- Luo, Cunjin
- Article
40
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7620125
- Odemis, Murat;
- Yucel, Cagatay;
- Koltuksuz, Ahmet
- Article
41
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5586335
- Zhang, Huixia;
- Shen, Guowei;
- Guo, Chun;
- Cui, Yunhe;
- Jiang, Chaohui
- Article
42
- American Scholar, 2014, v. 83, n. 2, p. 12
- Article
43
- International Journal of Distributed Sensor Networks, 2022, v. 18, n. 4, p. 1, doi. 10.1177/15501329221084882
- Zhao, Liguo;
- Zhu, Derong;
- Shafik, Wasswa;
- Matinkhah, S Mojtaba;
- Ahmad, Zubair;
- Sharif, Lule;
- Craig, Alisa
- Article
44
- International Journal of Distributed Sensor Networks, 2021, v. 17, n. 5, p. 1, doi. 10.1177/15501477211015145
- Cheng Huang;
- Yongyan Guo;
- Wenbo Guo;
- Ying Li
- Article
45
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 9, p. 1, doi. 10.1177/1550147720954678
- Wang, Lixin;
- Yang, Jianhua;
- Wan, Peng-Jun
- Article
46
- International Journal of Distributed Sensor Networks, 2019, v. 15, n. 2, p. 1, doi. 10.1177/1550147719831180
- Miao, Li;
- Wang, Lina;
- Li, Shuai;
- Xu, Haitao;
- Zhou, Xianwei
- Article
47
- International Journal of Design, Analysis & Tools for Integrated Circuits & Systems, 2023, v. 12, n. 2, p. 1
- Shu-Jui Chang;
- Tim Watson;
- Iain Phillips
- Article
48
- Emory Law Journal, 2017, v. 66, n. 3, p. 697
- Article
49
- Emory Law Journal, 2017, v. 66, n. 3, p. 513
- Article
50
- Connections (18121098), 2020, v. 19, n. 1, p. 39, doi. 10.11610/Connections.19.1.04
- Article