Works matching Database security
1
- Journal of Information Technology Education: Research, 2010, v. 9, p. IIP61
- Article
2
- African Journal of Science, Technology, Innovation & Development, 2022, v. 14, n. 7, p. 1761, doi. 10.1080/20421338.2021.1984010
- Magura, Zorodzai;
- Zhou, Tinashe Gwendolyn;
- Musungwini, Samuel
- Article
3
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 176, doi. 10.54216/JCIM.160114
- Naguib, Ahmed;
- Aslan, Haba K.;
- Fouad, Khaled M.
- Article
4
- Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2023, v. 33, n. 3, p. 17, doi. 10.33436/v33i3y202302
- BĂRBULESCU, Daniel;
- ENACHE-DUCOFFE, Adriana-Cristina;
- TOGAN, Mihai
- Article
5
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 361
- Article
6
- Wireless Networks (10220038), 2024, v. 30, n. 7, p. 6399, doi. 10.1007/s11276-023-03436-z
- Iqbal, Asif;
- Khan, Siffat Ullah;
- Niazi, Mahmood;
- Humayun, Mamoona;
- Sama, Najm Us;
- Khan, Arif Ali;
- Ahmad, Aakash
- Article
7
- Computing & Informatics, 2013, v. 32, n. 6, p. 1192
- Eun-Ae CHO;
- Chang-Joo MOON;
- Dae-Ha PARK;
- Kang-Bin YIM
- Article
8
- Journal of Experimental Criminology, 2023, v. 19, n. 2, p. 465, doi. 10.1007/s11292-021-09490-x
- Guedes, Inês;
- Moreira, Samuel;
- Cardoso, Carla Sofia
- Article
9
- Journal of Management Information Systems, 1989, v. 6, n. 1, p. 101, doi. 10.1080/07421222.1989.11517851
- Adam, Nabil R.;
- Jones, Douglas H.
- Article
10
- International Journal of Pattern Recognition & Artificial Intelligence, 2004, v. 18, n. 1, p. 3, doi. 10.1142/S0218001404003022
- Article
11
- Information Systems Research, 2002, v. 13, n. 4, p. 389, doi. 10.1287/isre.13.4.389.74
- Sarathy, Rathindra;
- Muralidhar, Krishnamurty
- Article
12
- Journal of King Abdulaziz University: Engineering Sciences, 2017, v. 28, n. 1, p. 19, doi. 10.4197/Eng.28-1.2
- Khalaf, Emad F.;
- Kadi, Mustafa M.
- Article
13
- Economic Computation & Economic Cybernetics Studies & Research, 2019, v. 53, n. 3, p. 113, doi. 10.24818/18423264/53.3.19.07
- NICA, Elvira;
- TUDORICA, Bogdan George;
- DUSMANESCU, Dorel-Mihail;
- POPESCU, Gheorghe;
- BREAZ, Alina Maria
- Article
14
- ISSA Journal, 2019, v. 17, n. 4, p. 22
- Article
15
- Malaysian Journal of Computer Science, 2020, p. 1, doi. 10.22452/mjcs.sp2020no1.1
- Raj, R. Joshua Samuel;
- Prakash, M. Viju;
- Prince, T.;
- Shankar, K.;
- Varadarajan, Vijayakumar;
- Nonyelu, Fredi
- Article
16
- Knowledge & Information Systems, 2021, v. 63, n. 8, p. 2209, doi. 10.1007/s10115-021-01589-x
- Maté, Alejandro;
- Peral, Jesús;
- Trujillo, Juan;
- Blanco, Carlos;
- García-Saiz, Diego;
- Fernández-Medina, Eduardo
- Article
17
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/5113725
- Xu, Zhiying;
- Yang, Ting;
- Najafi, Moslem Lari
- Article
18
- Management Science, 1999, v. 45, n. 10, p. 1399, doi. 10.1287/mnsc.45.10.1399
- Muralidhar, Krishnamurty;
- Parsa, Rahul;
- Sarathy, Rathindra
- Article
19
- European Security, 2022, v. 31, n. 3, p. 454, doi. 10.1080/09662839.2022.2101886
- Bellanova, Rocco;
- Glouftsios, Georgios
- Article
20
- Journal of Applied Quantitative Methods, 2009, v. 4, n. 4, p. 449
- Article
21
- Future Internet, 2025, v. 17, n. 4, p. 156, doi. 10.3390/fi17040156
- Ajasa, Ade Dotun;
- Chizari, Hassan;
- Alam, Abu
- Article
22
- International Journal of Simulation: Systems, Science & Technology, 2020, v. 21, n. 1, p. 1, doi. 10.5013/IJSSST.a.21.01.09
- Shkoukani, Mohammad;
- Altamimi, Ahmad Mousa
- Article
23
- Buletin Stiintific, 2023, v. 28, n. 1, p. 55, doi. 10.2478/bsaft-2023-0006
- MOCEAN, Loredana;
- VLAD, Miranda-Petronella
- Article
24
- Pharmaceutical Sciences Asia, 2022, v. 49, n. 2, p. 123, doi. 10.29090/psa.2022.02.21.086
- Luangmonkong, Theerut;
- Wongsaardsakul, Jiratchaya;
- Laobutree, Rujipas;
- Jindarat, Sarawut;
- Jaisupa, Nattapon
- Article
25
- Computational Intelligence, 2019, v. 35, n. 4, p. 693, doi. 10.1111/coin.12209
- Tufail, Hina;
- Zafar, Kashif;
- Baig, Abdul Rauf
- Article
26
- 2023
- and Communication Networks, Security
- Correction Notice
27
- Indian Journal of Forensic Medicine & Toxicology, 2022, v. 16, n. 3, p. 159, doi. 10.37506/ijfmt.v16i3.18273
- Salih, Esam Ghazi Mohammed;
- Nader, Mohammed Ibrahim;
- Sabbah, Majeed Arsheed;
- Al-Zubaidi, Mohammed Mahdi;
- Mahmood, Hanan Khaleel;
- Salih, Khalifah Mahdi;
- Hasan, Dhurgham Hameed
- Article
28
- Journal of Applied Security Research, 2023, v. 18, n. 3, p. 421, doi. 10.1080/19361610.2021.2006032
- Kilavo, Hassan;
- Mrutu, Salehe I.;
- Dudu, Robert G.
- Article
29
- Strategic Finance, 2002, v. 84, n. 6, p. 48
- Fulkerson, Cheryl L.;
- Gonsoulin, Mark A.;
- Walz, Diane B.
- Article
30
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 191, doi. 10.54216/JCIM.130215
- Gupta, Shyam S.;
- Kumar, Pankaj;
- Shrivastava, Rajeev;
- Jena, Satyabrata;
- Pandey, Tushar Kumar;
- Nigam, Ankita
- Article
31
- Management Science, 1995, v. 41, n. 9, p. 1549, doi. 10.1287/mnsc.41.9.1549
- Muralidhar, Krishnamurty;
- Batra, Dinesh
- Article
32
- Singidunum Journal of Applied Sciences, 2014, p. 88, doi. 10.15308/SInteZa-2014-88-93
- Kovačević, Anđelka;
- Dimitrijević, Milan;
- Popović, Luka
- Article
33
- Sustainability (2071-1050), 2023, v. 15, n. 23, p. 16276, doi. 10.3390/su152316276
- Jeribi, Fathe;
- Ahamed, Shaik Rafi;
- Perumal, Uma;
- Alhameed, Mohammed Hameed;
- Chari Kamsali, Manjunatha
- Article
34
- IT Professional, 2015, v. 17, n. 1, p. 58, doi. 10.1109/MITP.2015.7
- Article
36
- Information Systems Management, 1999, v. 16, n. 2, p. 85, doi. 10.1201/1078/43188.16.2.19990301/31181.13
- Article
37
- Biological Procedures Online, 2021, v. 23, n. 1, p. 1, doi. 10.1186/s12575-020-00139-z
- Mohammadipanah, Fatemeh;
- Sajedi, Hedieh
- Article
38
- Journal of Database Management, 2005, v. 16, n. 1, p. 1, doi. 10.4018/jdm.2005010101
- Article
39
- Scientific Data, 2021, v. 8, n. 1, p. 1, doi. 10.1038/s41597-021-01074-8
- Croke, Jacky;
- Vítkovský, John;
- Hughes, Kate;
- Campbell, Micheline;
- Amirnezhad-Mozhdehi, Sahar;
- Parnell, Andrew;
- Cahill, Niamh;
- Dalla Pozza, Ramona
- Article
40
- Military Engineer / Hadmérnök, 2011, v. 6, n. 2, p. 148
- Rita, Fleiner;
- Sándor, Munk
- Article
41
- Cihan University-Erbil Scientific Journal, 2024, v. 8, n. 1, p. 70, doi. 10.24086/cuesj.v8n1y2024.pp70-79
- Jasim, Khalid F.;
- Zeki, Akram M.
- Article
42
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2015, v. 30, n. 3/4, p. 69, doi. 10.3969/j.issn.2095-476X.2015.3/4.015
- Article
43
- International Journal of Theoretical Physics, 2019, v. 58, n. 6, p. 1828, doi. 10.1007/s10773-019-04076-w
- Wang, Ying;
- Guo, Fen-Zhuo;
- Liu, Li;
- Huang, Wei;
- Wen, Qiao-Yan
- Article
44
- i-Manager's Journal on Information Technology, 2020, v. 9, n. 2, p. 12, doi. 10.26634/jit.9.2.17685
- RAO, M. SOMASUNDARA;
- RAO, K. VENKATA;
- PRASAD, M. H. M. KRISHNA
- Article
45
- Journal of Madenat Al-Elem University College / Magallaẗ Kulliyyaẗ Madīnaẗ Al-ʿAlam Al-Ğāmi'aẗ, 2018, v. 10, n. 1, p. 32
- Habeeb, Shatha;
- Hassan, Rehab F.
- Article
46
- UHD Journal of Science & Technology, 2021, v. 5, n. 2, p. 38, doi. 10.21928/uhdjst.v5n2y2021.pp38-46
- Teimoor, Ramyar Abdulrahman
- Article
47
- Journal of Applied Quantitative Methods, 2009, v. 4, n. 2, p. 237
- Rednic, Emanuil;
- Toma, Andrei
- Article
48
- Software (2674-113X), 2023, v. 2, n. 2, p. 163, doi. 10.3390/software2020007
- Ulybyshev, Denis;
- Rogers, Michael;
- Kholodilo, Vadim;
- Northern, Bradley
- Article
49
- Advances in Electrical & Electronic Engineering, 2017, v. 15, n. 2, p. 192, doi. 10.15598/aeee.v15i2.2164
- ABDELLAH, Mohamed Refaat;
- MOHAMED, Hesham Aboelsoud;
- BADRAN, Khaled Shafee;
- SENOUSY, Mohamed Badr
- Article
50
- Al-Yarmouk Journal, 2018, v. 10, n. 10, p. 1
- Article