Works matching DE "SECURITY systems industry"
1
- Power Engineer, 2005, v. 19, n. 1, p. 38, doi. 10.1049/pe:20050108
- Article
2
- Power Engineer, 2004, v. 18, n. 2, p. 18, doi. 10.1049/pe:20040207
- Article
3
- ISSA Journal, 2017, v. 15, n. 4, p. 16
- Article
4
- ISSA Journal, 2017, v. 15, n. 4, p. 9
- Article
5
- Information Systems Journal, 2009, v. 19, n. 4, p. 391, doi. 10.1111/j.1365-2575.2007.00289.x
- Dinev, Tamara;
- Goo, Jahyun;
- Hu, Qing;
- Nam, Kichan
- Article
6
- Annals of the University of Oradea, Economic Science Series, 2008, v. 17, n. 4, p. 1397
- Ion, Ivan;
- Traian, Surcel;
- Cristian, Amancei
- Article
7
- Strategic Finance, 2004, v. 85, n. 8, p. 55
- Article
8
- Strategic Finance, 2003, v. 85, n. 4, p. 72
- Article
9
- SA Crime Quarterly, 2011, n. 38, p. 1
- Article
10
- SA Crime Quarterly, 2011, n. 38, p. 23
- BERG, JULIE;
- NOUVEAU, JEAN-PIERRE
- Article
11
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2009, v. 44, n. 1, p. 32
- Article
12
- Forensic Examiner, 2003, v. 12, n. 3/4, p. 26
- Article
13
- International Journal of Micrographics & Optical Technology, 2009, v. 27, n. 1/2, p. 8
- Article
14
- International Journal of Micrographics & Optical Technology, 2008, v. 26, n. 5, p. 5
- Article
15
- Debates IESA, 2013, v. 18, n. 4, p. 71
- Article
16
- Total Quality Management & Business Excellence, 2009, v. 20, n. 8, p. 787, doi. 10.1080/14783360903128058
- Article
17
- Journal of Electronic Imaging, 2008, v. 17, n. 1, p. 11015, doi. 10.1117/1.2891313
- Robert W. Ives;
- Randy P. Broussard;
- Lauren R. Kennell;
- David L. Soldan
- Article
18
- Journal of Cryptology, 2007, v. 20, n. 4, p. 431, doi. 10.1007/s00145-007-0567-1
- Kalai, Yael Tauman;
- Lindell, Yehuda;
- Prabhakaran, Manoj
- Article
19
- Internal Auditor, 2007, v. 64, n. 5, p. 15
- Article
20
- Telecommunication Engineering, 2014, v. 54, n. 5, p. 637, doi. 10.3969/j.issn.1001-893x.2014.05.021
- Article
21
- Pacific McGeorge Global Business & Development Law Journal, 2010, v. 22, n. 2, p. 323
- Article
22
- International Journal of Performability Engineering, 2009, v. 5, n. 5, p. 419
- Liudong Xingi;
- Haoli Li;
- Michel, Howard E.
- Article
23
- Policy & Society, 2011, v. 30, n. 3, p. 221, doi. 10.1016/j.polsoc.2011.07.006
- Article
24
- Homeland Defense Journal, 2007, v. 5, n. 10, p. 45
- Article
25
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 8
- Article
26
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 6
- Article
27
- Homeland Defense Journal, 2007, v. 5, n. 7, p. 15
- Article
28
- Homeland Defense Journal, 2007, v. 5, n. 6, p. 56
- Article
29
- Homeland Defense Journal, 2007, v. 5, n. 4, p. 64
- Article
30
- Sensors (14248220), 2012, v. 12, n. 4, p. 4870, doi. 10.3390/s120404870
- Abanc¢, Cludia;
- Hrlimann, Marcel;
- Fritschi, Bruno;
- Graf, Christoph;
- Moya, Jos
- Article
31
- Sensors (14248220), 2011, v. 11, n. 11, p. 10738, doi. 10.3390/s111110738
- Mohamed, Nader;
- Jawhar, Imad;
- Al-Jaroodi, Jameela;
- Zhang, Liren
- Article
32
- Issues in Information Systems, 2013, v. 14, n. 2, p. 444
- Rice, Erich;
- Safonov, Paul;
- Guster, Dennis
- Article
33
- International Journal of Information Security, 2012, v. 11, n. 1, p. 41, doi. 10.1007/s10207-011-0148-z
- Wang, Yuanzhuo;
- Yu, Min;
- Li, Jingyuan;
- Meng, Kun;
- Lin, Chuang;
- Cheng, Xueqi
- Article
34
- International Journal of Information Security, 2009, v. 8, n. 1, p. 49, doi. 10.1007/s10207-008-0063-0
- Mashatan, Atefeh;
- Stinson, Douglas
- Article
35
- International Journal of Information Security, 2008, v. 7, n. 2, p. 103, doi. 10.1007/s10207-007-0045-7
- Alfaro, J. G.;
- Boulahia-Cuppens, N.;
- Cuppens, F.
- Article
36
- Wireless Networks (10220038), 2009, v. 15, n. 3, p. 279, doi. 10.1007/s11276-007-0039-4
- Wenjing Lou;
- Wei Liu;
- Yanchao Zhang;
- Yuguang Fang
- Article
37
- Policing & Society, 2006, v. 16, n. 1, p. 27, doi. 10.1080/10439460500399395
- Article
38
- Policing & Society, 2006, v. 16, n. 1, p. 50, doi. 10.1080/10439460500399445
- Lippert, Randy;
- O'Connor, Daniel
- Article
39
- Military Engineer / Hadmérnök, 2024, v. 19, n. 3, p. 137, doi. 10.32567/hm.2024.3.9
- Ottó, Ináncsi Mátyás;
- Máté, Dub
- Article
40
- Military Engineer / Hadmérnök, 2012, v. 7, n. 2, p. 260
- Article
41
- Military Engineer / Hadmérnök, 2011, v. 6, n. 3, p. 14
- Article
42
- International Review on Modelling & Simulations, 2011, v. 4, n. 3, p. 1266
- Pahlavanhoseini, A.;
- Toorani, R.;
- Khanjanzadeh, A.;
- Sedighizadeh, M.
- Article
43
- International Journal of Distributed Sensor Networks, 2005, v. 1, n. 2, p. 187, doi. 10.1080/15501320590966440
- Olariu, S.;
- Xu, Q.;
- Eltoweissy, M.;
- Wadaa, A.;
- Zomaya, A. Y.
- Article
44
- Brief, 2012, v. 41, n. 2, p. 11
- Article
45
- Annals of DAAAM & Proceedings, 2011, p. 1541
- Article
46
- CURIE Journal, 2010, v. 3, n. 1, p. 41
- Article
47
- Journal of Network & Systems Management, 2012, v. 20, n. 2, p. 155, doi. 10.1007/s10922-010-9179-4
- Tang, Yi;
- Jiang, Junchen;
- Hu, Chengchen;
- Liu, Bin
- Article
48
- Journal of Network & Systems Management, 2006, v. 14, n. 1, p. 127, doi. 10.1007/s10922-005-9012-7
- Gaglio, Salvatore;
- Gatani, Luca;
- Re, Giuseppe Lo;
- Urso, Alfonso
- Article
49
- Journal of Network & Systems Management, 2005, v. 13, n. 3, p. 329, doi. 10.1007/s10922-005-6263-2
- Manes, Gavin W.;
- Schulte, Dominic;
- Guenther, Seth;
- Shenoi, Sujeet
- Article