Works matching DE "DATA transmission system security measures"
1
- Financial Executive, 2005, v. 21, n. 8, p. 12
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
2
- Journal of Multimedia, 2010, v. 5, n. 3, p. 232, doi. 10.4304/jmm.5.3.232-239
- Article
3
- Iraqi Journal of Science, 2021, v. 62, n. 11, p. 4110, doi. 10.24996/ijs.2021.62.11.31
- Ali, Rawaa Hamza;
- Kadhim, Jamal Mohamed
- Article
4
- Denver Law Review, 2016, v. 93, n. 4, p. 833
- Article
5
- IETE Journal of Research, 2011, v. 57, n. 2, p. 165, doi. 10.4103/0377-2063.81745
- Rao, K. Deergha;
- Kumar, K. Praveen;
- Murali Krishna, P. V.
- Article
6
- Defence Science Journal, 2016, v. 66, n. 2, p. 146, doi. 10.14429/dsj.66.9705
- Rath, Mamata;
- Pattanayak, Binod Kumar;
- Pati, Bibudhendu
- Article
7
- Actualidad Jurídica (1578-956X), 2017, n. 45, p. 36
- Article
8
- ESTEEM, 2018, v. 14, p. 45
- Shukor, Abdul Hakim;
- Shamsudin, Noratikah;
- Seman, Noraini
- Article
9
- Journal of Applied Security Research, 2015, v. 10, n. 2, p. 221, doi. 10.1080/19361610.2015.1004512
- Jayarin, P. Jesu;
- Visumathi, J.;
- Srilakshmi, R.;
- Pendyala, Madhuri
- Article
10
- Adhoc & Sensor Wireless Networks, 2018, v. 42, n. 1/2, p. 63
- REKIK, MALEK;
- MAKHLOUF, AMEL;
- ZARAI, FAOUZI;
- OBAIDAT, MOHAMMAD S.
- Article
11
- Technical Journal of University of Engineering & Technology Taxila, 2018, v. 23, n. 2, p. 50
- Anwar, M.;
- Abdullah, A. H.;
- Butt, R. A.;
- Ashraf, M. W.;
- Qureshi, K. N.;
- Ullah, F.
- Article
12
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 121, doi. 10.1007/s11036-013-0454-y
- Chou, Yao-Hsin;
- Zeng, Guo-Jyun;
- Lin, Fang-Jhu;
- Chen, Chi-Yuan;
- Chao, Han-Chieh
- Article
13
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2014, v. 39, n. 2, p. 777, doi. 10.1007/s13369-013-0686-y
- Najafzadeh, Sara;
- Ithnin, Norafida;
- Razak, Shukor;
- Karimi, Ramin
- Article
14
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 1, p. 21, doi. 10.1080/19393555.2013.780272
- Bhatia, Manjot;
- Muttoo, SunilKumar;
- Bhatia, M.P. S.
- Article
15
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 5, p. 243, doi. 10.1080/19393555.2010.499799
- Tawalbeh, Lo'aiA.;
- Sweidan, Saadeh
- Article
16
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 170, doi. 10.1080/19393550802369800
- Article
17
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 3055, doi. 10.1007/s11277-018-5994-9
- Article
18
- International Journal of Science, Innovation & New Technology, 2016, v. 1, n. 16, p. 25
- IDRIZI, Florim;
- MEMETI, Agon;
- RAHMANI, Burhan
- Article
19
- Computer und Recht, 2020, v. 36, n. 2, p. 82, doi. 10.9785/cr-2020-360209
- Article
20
- Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2013, v. 11, n. 2, p. 237
- Sugata SANYAL;
- Priyanka NAIK
- Article
21
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/846739
- Zhu, Shuhua;
- Li, Xiaojie;
- Zhu, Chunsheng;
- Shu, Lei;
- Sun, Wei
- Article
22
- Sensors (14248220), 2010, v. 10, n. 4, p. 3718, doi. 10.3390/s100403718
- Ying Qiu;
- Jianying Zhou;
- Joonsang Baek;
- Lopez, Javier
- Article
23
- Chemical Engineering, 2018, v. 125, n. 9, p. 44
- Article
24
- 2019
- Chen, Weimin;
- Chen, Zhigang;
- Cui, Fang
- journal article
25
- Journal: American Water Works Association, 2013, v. 105, n. 6, p. 18, doi. 10.5942/jawwa.2013.105.0091
- Article
26
- i-Manager's Journal on Computer Science, 2015, v. 3, n. 1, p. 27, doi. 10.26634/jcom.3.1.3439
- REDDY, D. SRUJAN CHANDRA;
- KUMAR, V. V. SUNIL
- Article
27
- IEEE Transactions on Software Engineering, 2009, v. 35, n. 1, p. 67
- Spiekerman, Sarah;
- Cranor, Lorrie Faith
- Article
28
- International Journal of Electrical & Computer Engineering (2088-8708), 2016, v. 6, n. 6, p. 2735, doi. 10.11591/ijece.v6i6.10792
- Arya, Meenakshi S.;
- Rani, Meenu;
- Bedi, Charndeep Singh
- Article
29
- International Journal of Network Management, 2015, v. 25, n. 5, p. 263, doi. 10.1002/nem.1902
- Bartos, Karel;
- Rehak, Martin
- Article
30
- ASHRAE Transactions, 2006, v. 112, n. 2, p. 671
- Lathrop, Scott D.;
- Gates, Christopher L.;
- Massie, Darrell D.
- Article
31
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5133, doi. 10.1002/sec.1683
- Zhang, Pei;
- Liu, Yi-Liang;
- Zhang, Jian-ming;
- Wang, Liang-min
- Article
32
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4151, doi. 10.1002/sec.1595
- Zou, Chao;
- Chigan, Chunxiao (Tricia)
- Article
33
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4391, doi. 10.1002/sec.1615
- Pandian, K. K. Soundra;
- Ray, Kailash Chandra
- Article
34
- Security & Communication Networks, 2016, v. 9, n. 3, p. 241, doi. 10.1002/sec.541
- Guo, Ming-Huang;
- Liaw, Horng-Twu;
- Chiu, Meng-Yu;
- Deng, Der-Jiunn
- Article
35
- Security & Communication Networks, 2015, v. 8, n. 6, p. 1026, doi. 10.1002/sec.1057
- Jiang, Rong;
- Lu, Rongxing;
- Luo, Jun;
- Lai, Chengzhe;
- Shen, Xuemin (Sherman)
- Article
36
- Security & Communication Networks, 2011, v. 4, n. 8, p. 966, doi. 10.1002/sec.230
- Chen, Yanling;
- Han Vinck, A. J.
- Article
37
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/3567323
- Chen, Dechuan;
- Yang, Weiwei;
- Hu, Jianwei;
- Cai, Yueming;
- Zhu, Sen
- Article
38
- Applied Clinical Trials, 2001, v. 10, n. 8, p. 21
- Article
39
- Multimedia Tools & Applications, 2019, v. 78, n. 7, p. 8311, doi. 10.1007/s11042-018-6813-8
- Yao, Heng;
- Liu, Xiaokai;
- Tang, Zhenjun;
- Qin, Chuan;
- Tian, Ying
- Article
40
- Multimedia Tools & Applications, 2017, v. 76, n. 22, p. 24063, doi. 10.1007/s11042-016-4111-x
- Tayal, Neha;
- Bansal, Ritesh;
- Dhal, Sangeeta;
- Gupta, Shailender
- Article
41
- Multimedia Tools & Applications, 2017, v. 76, n. 4, p. 6031, doi. 10.1007/s11042-015-3142-z
- Cheng, Po-Hsin;
- Chang, Ko-Chin;
- Liu, Chiang-Lung
- Article
42
- Multimedia Tools & Applications, 2015, v. 74, n. 5, p. 1645, doi. 10.1007/s11042-014-2019-x
- Chang, Ya;
- Huang, Cheng-Ta;
- Huang, Chia-Ling;
- Wang, Shiuh-Jeng
- Article
43
- Journal of Information & Communication Convergence Engineering, 2017, v. 15, n. 1, p. 14, doi. 10.6109/jicce.2017.15.1.14
- Abbas, Mohammed Adil;
- Jun-Pyo Hong
- Article
44
- Mathematical Structures in Computer Science, 2016, v. 26, n. 8, p. 1352, doi. 10.1017/S0960129514000619
- CAPECCHI, SARA;
- CASTELLANI, ILARIA;
- DEZANI-CIANCAGLINI, MARIANGIOLA
- Article
45
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. 929, doi. 10.1109/TDSC.2010.48
- Wu, Jiang;
- Stinson, Doug R.
- Article
46
- Journal of Supercomputing, 2012, v. 59, n. 1, p. 22, doi. 10.1007/s11227-010-0413-3
- Majzoub, Sohaib;
- Diab, Hassan
- Article
47
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 201, doi. 10.1007/s11277-018-5835-x
- Jayaraman, Sathiamoorthy;
- Bhagavathiperumal, Ramakrishnan;
- Mohanakrishnan, Usha
- Article
48
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 915, doi. 10.1007/s11277-018-5733-2
- Soumyasri, S. M.;
- Ballal, Rajkiran
- Article
49
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 3923, doi. 10.1007/s11277-017-4359-0
- Cai, Ruo;
- Tan, Wesley;
- Chong, Peter
- Article
50
- Wireless Personal Communications, 2016, v. 86, n. 1, p. 287, doi. 10.1007/s11277-015-3063-1
- Kim, Seokhoon;
- Na, Wonshik
- Article