Works matching DE "DATABASE security"
1
- Cyber Security & Data Governance, 2025, v. 44, n. 5, p. 27, doi. 10.19358/j.issn.2097-1788.2024.05.004
- Article
2
- Mobile Networks & Applications, 2024, v. 29, n. 6, p. 1796, doi. 10.1007/s11036-023-02217-4
- Alauthman, Mohammad;
- Aljuaid, Hanan;
- Sathyaprakash, P.;
- Aldweesh, Amjad;
- M, Anand;
- Rasheed, Tariq;
- Jumani, Awais Khan
- Article
3
- International Review of Law, Computers & Technology, 2005, v. 19, n. 3, p. 329, doi. 10.1080/13600860500348572
- Leenes, Ronald;
- Koops, Bert-Jaap
- Article
4
- Computer Systems Science & Engineering, 2006, v. 21, n. 5, p. 381
- Article
5
- Government Technology, 2011, v. 24, n. 9, p. 28
- Article
6
- Bio-IT World, 2006, v. 5, n. 6, p. 31
- Article
7
- Bio-IT World, 2003, v. 2, n. 9, p. 18
- Article
8
- Journal of Network & Information Security, 2017, v. 5, n. 1, p. 20
- Vijayan, S.;
- Madhusudhanan, S.
- Article
9
- Geopolitics, 2022, v. 27, n. 1, p. 113, doi. 10.1080/14650045.2020.1830764
- Article
10
- Business Informatics / Informatyka Ekonomiczna, 2015, v. 3, n. 37, p. 48, doi. 10.15611/ie.2015.3.04
- Article
11
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1789222
- Article
12
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3940849
- Jeet, Rubal;
- Kang, Sandeep Singh;
- Safiul Hoque, Shah Md.;
- Dugbakie, Betty Nokobi
- Article
13
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/5113725
- Xu, Zhiying;
- Yang, Ting;
- Najafi, Moslem Lari
- Article
14
- Genes, 2020, v. 11, n. 7, p. 743, doi. 10.3390/genes11070743
- Yin, Caiyong;
- Su, Kaiyuan;
- He, Ziwei;
- Zhai, Dian;
- Guo, Kejian;
- Chen, Xueyun;
- Jin, Li;
- Li, Shilin
- Article
15
- Iraqi Journal for Electrical & Electronic Engineering, 2023, v. 19, n. 1, p. 93, doi. 10.37917/ijeee.19.1.12
- Baban, Alaa B.;
- Hameed, Safa A.
- Article
16
- Romanian Review Precision Mechanics, Optics & Mecatronics, 2014, n. 45, p. 137
- Article
17
- LESIJ - Lex ET Scientia International Journal, 2010, v. 17, n. 2, p. 281
- Păun, Cristian Teodor;
- Simion, Emil
- Article
18
- Journal of Organizational Computing & Electronic Commerce, 1995, v. 5, n. 2, p. 123, doi. 10.1080/10919399509540246
- Duncan, George T.;
- Krishna, Ramayya;
- Mukherjee, Sumitra
- Article
19
- IT Professional, 2015, v. 17, n. 1, p. 58, doi. 10.1109/MITP.2015.7
- Article
20
- IT Professional, 2011, v. 13, n. 1, p. 9, doi. 10.1109/MITP.2011.11
- Radack, Shirley;
- Kuhn, Rick
- Article
21
- IT Professional, 2011, v. 13, n. 1, p. 12, doi. 10.1109/MITP.2011.6
- Assante, Michael J.;
- Tobey, David H.
- Article
22
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 6, p. 4156, doi. 10.1007/s12083-024-01761-4
- Article
23
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 5, p. 2694, doi. 10.1007/s12083-020-01042-w
- Liao, Dan;
- Li, Hui;
- Wang, Wentao;
- Wang, Xiong;
- Zhang, Ming;
- Chen, Xue
- Article
24
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 2, p. 821, doi. 10.1007/s12083-020-01038-6
- G, Irin Loretta;
- Kavitha, V.
- Article
25
- ComputerWorld Hong Kong, 2008, v. 25, n. 2, p. 26
- Article
26
- Engineering Letters, 2020, v. 28, n. 3, p. 930
- Article
27
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/3574812
- Zhu, Guicun;
- Li, Xingguo;
- Zheng, Changlong;
- Wang, Linlin
- Article
28
- Special Education, 2022, v. 1, n. 43, p. 5359
- Vinjamuri, Lakshmi Priya;
- A., Aghanaashaa
- Article
29
- Biological Procedures Online, 2021, v. 23, n. 1, p. 1, doi. 10.1186/s12575-020-00139-z
- Mohammadipanah, Fatemeh;
- Sajedi, Hedieh
- Article
30
- Journal of Database Management, 2016, v. 27, n. 1, p. 29, doi. 10.4018/JDM.2016010102
- Chua, Cecil Eng Huang;
- Storey, Veda C.
- Article
31
- Journal of Database Management, 2007, v. 18, n. 3, p. 21, doi. 10.4018/jdm.2007070102
- Shi-Ming Huang;
- Yen, David C.;
- Hsiang-Yuan Hsueh
- Article
32
- Journal of Database Management, 2005, v. 16, n. 1, p. 1, doi. 10.4018/jdm.2005010101
- Article
33
- Nursing & Residential Care, 2007, v. 9, n. 2, p. 52, doi. 10.12968/nrec.2007.9.2.22742
- Article
34
- Journal of Research & Practice in Information Technology, 2009, v. 41, n. 2, p. 135
- Blanco, Carlos;
- De Guzmán, Ignacio García-Rodríguez;
- Rosado, David G.;
- Fernández-Medina, Eduardo;
- Trujillo, Juan
- Article
35
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 176, doi. 10.54216/JCIM.160114
- Naguib, Ahmed;
- Aslan, Haba K.;
- Fouad, Khaled M.
- Article
36
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 191, doi. 10.54216/JCIM.130215
- Gupta, Shyam S.;
- Kumar, Pankaj;
- Shrivastava, Rajeev;
- Jena, Satyabrata;
- Pandey, Tushar Kumar;
- Nigam, Ankita
- Article
37
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 1, p. 19, doi. 10.54216/JCIM.120102
- Ranjan, Raju;
- Ahlawat, Vinay Kumar
- Article
38
- Review of Computer Engineering Studies, 2022, v. 9, n. 2, p. 82, doi. 10.18280/rces.090207
- Alaluosi, Wasan Maddah;
- Mohammed, Ahmed Saud
- Article
39
- Journal of Management Information Systems, 1989, v. 6, n. 1, p. 101, doi. 10.1080/07421222.1989.11517851
- Adam, Nabil R.;
- Jones, Douglas H.
- Article
40
- Journal of Management Information Systems, 1987, v. 4, n. 2, p. 74, doi. 10.1080/07421222.1987.11517794
- Article
41
- Journal of Information Systems, 2016, v. 30, n. 1, p. 71, doi. 10.2308/isys-51257
- Steinbart, Paul John;
- Raschke, Robyn L.;
- Gal, Graham;
- Dilla, William N.
- Article
42
- Information & Communications Technology Law, 2012, v. 21, n. 1, p. 19, doi. 10.1080/13600834.2012.642613
- Article
43
- Harvard Journal of Law & Public Policy, 1994, v. 17, n. 2, p. 591
- Article
44
- Geomatics & Information Science of Wuhan University, 2022, v. 47, n. 11, p. 1946, doi. 10.13203/j.whugis20200219
- Article
45
- Malaysian Journal of Computer Science, 2021, v. 34, n. 1, p. 1, doi. 10.22452/mjcs.vol34no1.1
- Shah, Saeed Arif;
- Khan, Imran Ali;
- Kazmi, Syed Zaki Hassan;
- Md Nasaruddin, Fariza Hanum Binti
- Article
46
- Malaysian Journal of Computer Science, 2020, p. 1, doi. 10.22452/mjcs.sp2020no1.1
- Raj, R. Joshua Samuel;
- Prakash, M. Viju;
- Prince, T.;
- Shankar, K.;
- Varadarajan, Vijayakumar;
- Nonyelu, Fredi
- Article
47
- International Journal of Information Security Science, 2017, v. 6, n. 4, p. 39
- Varol, Asaf;
- Sönmez, Yeşim Ülgen
- Article
48
- International Journal of Information Security Science, 2017, v. 6, n. 4, p. 57
- Jones, Justin;
- Shashidhar, Narasimha
- Article
49
- International Journal of Information Security Science, 2014, v. 3, n. 1, p. 129
- Dayıoğlu, Ziynet Nesibe;
- Kiraz, Mehmet Sabir;
- Birinci, Fatih;
- Akın, İhsan Haluk
- Article
50
- Journal of Information Technology & Applications, 2019, v. 9, n. 1, p. 29, doi. 10.7251/JIT1901029L
- Latinović, Branko;
- Avramović, Zoran Ž.;
- Zajmović, Mahir
- Article