Works matching DE "MASQUERADERS (Computer users)"
1
- Applied Stochastic Models in Business & Industry, 2014, v. 30, n. 5, p. 632, doi. 10.1002/asmb.2057
- Skudlarek, Stefan Jan;
- Yamamoto, Hirosuke
- Article
2
- Parallel Processing Letters, 2011, v. 21, n. 1, p. 21, doi. 10.1142/S0129626411000047
- CHENG-CHI LEE;
- CHUN-TA LI;
- SHUN-DER CHEN
- Article
3
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 3, p. 557, doi. 10.1007/s00500-016-2278-8
- Medina-Pérez, Miguel;
- Monroy, Raúl;
- Camiña, J.;
- García-Borroto, Milton
- Article
4
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2016, v. 20, n. 7, p. 2705, doi. 10.1007/s00500-015-1669-6
- Kudłacik, Przemysław;
- Porwik, Piotr;
- Wesołowski, Tomasz
- Article
5
- Computer und Recht, 2019, v. 35, n. 11, p. 714, doi. 10.9785/cr-2019-351109
- Article
6
- Annals of Clinical & Translational Neurology, 2018, v. 5, n. 5, p. 538, doi. 10.1002/acn3.551
- Takezawa, Yusuke;
- Kikuchi, Atsuo;
- Haginoya, Kazuhiro;
- Niihori, Tetsuya;
- Numata‐Uematsu, Yurika;
- Inui, Takehiko;
- Yamamura‐Suzuki, Saeko;
- Miyabayashi, Takuya;
- Anzai, Mai;
- Suzuki‐Muromoto, Sato;
- Okubo, Yukimune;
- Endo, Wakaba;
- Togashi, Noriko;
- Kobayashi, Yasuko;
- Onuma, Akira;
- Funayama, Ryo;
- Shirota, Matsuyuki;
- Nakayama, Keiko;
- Aoki, Yoko;
- Kure, Shigeo
- Article
7
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2612, doi. 10.1002/sec.1506
- Malhi, Avleen Kaur;
- Batra, Shalini
- Article
8
- Security & Communication Networks, 2015, v. 8, n. 7, p. 1265, doi. 10.1002/sec.1080
- Article
9
- Security & Communication Networks, 2012, v. 5, n. 9, p. 969, doi. 10.1002/sec.380
- Wang, Lian Jie;
- Chen, Jonathan Jen-Rong
- Article
10
- Security & Communication Networks, 2012, v. 5, n. 8, p. 863, doi. 10.1002/sec.311
- Salem, Malek Ben;
- Stolfo, Salvatore J.
- Article
11
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 8, p. 1, doi. 10.1177/1550147717724308
- YoHan Park;
- KiSung Park;
- KyungKeun Lee;
- Hwangjun Song;
- YoungHo Park
- Article
12
- Contemporary Educational Technology, 2010, v. 1, n. 1, p. 46
- Akbulut, Yavuz;
- Sahin, Yusuf Levent;
- Eristi, Bahadir
- Article
13
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 2, p. 164, doi. 10.1109/TDSC.2014.2327966
- Kholidy, Hisham A.;
- Baiardi, Fabrizio;
- Hariri, Salim
- Article
14
- International Journal of Fuzzy Systems, 2021, v. 23, n. 3, p. 862, doi. 10.1007/s40815-020-00947-1
- Liu, Wei;
- Mao, Yu;
- Ci, Linlin;
- Zhang, Fuquan
- Article
15
- International Journal of Information Security, 2014, v. 13, n. 6, p. 583, doi. 10.1007/s10207-014-0238-9
- Article
16
- Journal of Aggression, Maltreatment & Trauma, 2010, v. 19, n. 4, p. 372, doi. 10.1080/10926771003788979
- Article
17
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/1210938
- Article