Works matching DE "SECURITY systems industry"
1
- Government Technology, 2013, v. 26, n. 5, p. 28
- Article
2
- Government Technology, 2009, v. 22, n. 12, p. 36
- Article
3
- Government Technology, 2008, v. 21, n. 12, p. 22
- Article
4
- Personal & Ubiquitous Computing, 2010, v. 14, n. 6, p. 563, doi. 10.1007/s00779-009-0273-0
- Vassis, Dimitris;
- Belsis, Petros;
- Skourlas, Christos;
- Pantziou, Grammati
- Article
5
- Personal & Ubiquitous Computing, 2010, v. 14, n. 3, p. 227, doi. 10.1007/s00779-009-0257-0
- Bury, Sara;
- Ishmael, Johnathan;
- Race, Nicholas J. P.;
- Smith, Paul
- Article
6
- Personal & Ubiquitous Computing, 2003, v. 7, n. 1, p. 53, doi. 10.1007/s00779-002-0213-8
- Article
7
- Telecommunication Engineering, 2014, v. 54, n. 5, p. 637, doi. 10.3969/j.issn.1001-893x.2014.05.021
- Article
8
- Overland, 2007, n. 188, p. 14
- Article
9
- Information (2078-2489), 2023, v. 14, n. 12, p. 666, doi. 10.3390/info14120666
- Article
10
- Information Knowledge Systems Management, 2008, v. 7, n. 1/2, p. 159, doi. 10.3233/iks-2008-00122
- Friedman, Jon;
- Hoffman, Daniel V.
- Article
11
- ComputerWorld Hong Kong, 2010, v. 27, n. 3, p. 40
- Article
12
- ComputerWorld Hong Kong, 2007, v. 24, n. 11, p. 47
- Article
13
- IBEROAMERICANA. América Latina - España - Portugal, 2009, n. 35, p. 176
- Article
14
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2009, v. 44, n. 1, p. 32
- Article
15
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 989, doi. 10.1007/s11227-013-0965-0
- Article
16
- Journal of Supercomputing, 2012, v. 61, n. 1, p. 166, doi. 10.1007/s11227-011-0655-8
- Fanyang;
- Xiong, Naixue;
- Park, Jong
- Article
17
- Journal of Supercomputing, 2008, v. 45, n. 1, p. 44, doi. 10.1007/s11227-008-0184-2
- Kausar, Firdous;
- Hussain, Sajid;
- Yang, Laurence t.;
- Masood, Ashraf
- Article
18
- Marine Technology Society Journal, 2011, v. 45, n. 3, p. 88, doi. 10.4031/MTSJ.45.3.5
- Sauser, Brian;
- Qing Li;
- Ramirez-Marquez, Jose
- Article
19
- Intel Technology Journal, 2004, v. 8, n. 4, p. 303
- Rungta, Sanjay;
- Raman, Anant;
- Kohlenberg, Toby;
- Li, Hong;
- Dave, Manish;
- Kime, Greg
- Article
20
- Intel Technology Journal, 2004, v. 8, n. 4, p. 269
- Sedayao, Jeff;
- Vicente, John;
- Wouhaybi, Rita;
- Li, Hong;
- Dave, Manish;
- Rungta, Sanjay;
- Purcell, Stacy
- Article
21
- Journal of Professions & Organization, 2017, v. 4, n. 3, p. 302, doi. 10.1093/jpo/jox008
- Nicklich, Manuel;
- Fortwengel, Johann
- Article
22
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 5, p. 273
- Singh, Kuber;
- Mishra, Vinod Kumar;
- Meenakshi
- Article
23
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 1, p. 49, doi. 10.1142/S021819401000461X
- KIM, HYUNG-JONG;
- KIM, HUY KANG;
- LEE, HAE YOUNG
- Article
24
- International Journal of Performability Engineering, 2009, v. 5, n. 5, p. 419
- Liudong Xingi;
- Haoli Li;
- Michel, Howard E.
- Article
25
- Strategic Finance, 2004, v. 85, n. 8, p. 55
- Article
26
- Strategic Finance, 2003, v. 85, n. 4, p. 72
- Article
27
- Continuum: Journal of Media & Cultural Studies, 2014, v. 28, n. 6, p. 808, doi. 10.1080/10304312.2014.966406
- Article
28
- Chemistry & Industry, 2008, n. 11, p. 11
- Article
30
- Advanced Functional Materials, 2014, v. 24, n. 22, p. 3299, doi. 10.1002/adfm.201303874
- Honda, Wataru;
- Harada, Shingo;
- Arie, Takayuki;
- Akita, Seiji;
- Takei, Kuniharu
- Article
31
- European Competition & Regulatory Law Review, 2018, v. 2, n. 4, p. 296, doi. 10.21552/core/2018/4/10
- Møller, Marianne Henne;
- Klevstrand, Simen
- Article
32
- IETE Technical Review, 2010, v. 27, n. 3, p. 214, doi. 10.4103/0256-4602.62783
- Hu Xiong;
- Zhiguang Qin;
- Fagen Li
- Article
33
- Information Systems Journal, 2009, v. 19, n. 4, p. 391, doi. 10.1111/j.1365-2575.2007.00289.x
- Dinev, Tamara;
- Goo, Jahyun;
- Hu, Qing;
- Nam, Kichan
- Article
35
- Journal of Information Assurance & Security, 2013, v. 8, n. 6, p. 250
- Fathinavid, Amirhosein;
- Aghababa, Amir Bagheri;
- Eraghi, Alireza Enami;
- Farahani, A.
- Article
36
- Journal of Computer Systems, Networks, & Communications, 2010, p. 1, doi. 10.1155/2010/423281
- Trimintzios, Panagiotis;
- Georgiou, George
- Article
37
- Journal of Interconnection Networks, 2004, v. 5, n. 2, p. 151, doi. 10.1142/S0219265904001076
- DURRESI, ARJAN;
- PARUCHURI, VAMSI;
- BAROLLI, LEONARD;
- KANNAN, RAJGOPAL;
- IYENGAR, S. S.
- Article
38
- IEEE Transactions on Dependable & Secure Computing, 2013, v. 10, n. 6, p. 380, doi. 10.1109/TDSC.2013.19
- Mohaien, Abedelaziz;
- Kune, Denis Foo;
- Vasserman, Eugene Y.;
- Kim, Myungsun;
- Kim, Yongdae
- Article
39
- Mercer Law Review, 2013, v. 64, n. 4, p. 953
- Article
40
- Electronics & Electrical Engineering, 2009, n. 96, p. 62
- Article
41
- Estudios Sociales: Revista de Alimentación Contemporánea y Desarrollo Regional, 2012, v. 20, n. 40, p. 97
- Article
42
- Surveillance & Society, 2016, v. 14, n. 1, p. 122, doi. 10.24908/ss.v14i1.6282
- Mateescu, Alexandra;
- Rosenblat, Alex;
- boyd, danah
- Article
43
- Surveillance & Society, 2016, v. 14, n. 1, p. 34, doi. 10.24908/ss.v14i1.5622
- Article
44
- Surveillance & Society, 2016, v. 14, n. 1, p. 59, doi. 10.24908/ss.v14i1.5488
- Article
45
- Surveillance & Society, 2016, v. 14, n. 1, p. 90, doi. 10.24908/ss.v14i1.5372
- Article
46
- Debates IESA, 2013, v. 18, n. 4, p. 71
- Article
47
- Australian Journal of International Affairs, 2009, v. 63, n. 3, p. 390, doi. 10.1080/10357710903104851
- Article
48
- Critique: Journal of Socialist Theory, 2007, v. 35, n. 3, p. 339, doi. 10.1080/03017600701676738
- Article
49
- New Political Economy, 2005, v. 10, n. 1, p. 121, doi. 10.1080/13563460500031297
- Article
50
- Cotton Textile Technology, 2023, v. 51, n. 622, p. 33
- Article