Works matching Defense in depth (Computer security)
1
- Journal of Digital Convergence, 2018, v. 16, n. 2, p. 351, doi. 10.14400/JDC.2018.16.2.351
- Article
2
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/1263820
- Luo, Feng;
- Jiang, Yifan;
- Zhang, Zhaojing;
- Ren, Yi;
- Hou, Shuo
- Article
3
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6688489
- Wang, Tao;
- Chen, Hongchang
- Article
4
- Computers, Materials & Continua, 2021, v. 67, n. 2, p. 1429, doi. 10.32604/cmc.2021.014172
- Article
5
- IETE Journal of Research, 2016, v. 62, n. 2, p. 205, doi. 10.1080/03772063.2015.1083907
- Sharifi, Abbas Ali;
- Sharifi, Morteza;
- Musevi Niya, Mir Javad
- Article
6
- Advances in Fuzzy Systems, 2016, p. 1, doi. 10.1155/2016/2784067
- Article
7
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2633, doi. 10.23940/ijpe.18.11.p9.26332642
- Article
8
- Supportive Care in Cancer, 2021, v. 29, n. 5, p. 2405, doi. 10.1007/s00520-020-05750-0
- Kitta, A.;
- Hagin, A.;
- Unseld, M.;
- Adamidis, F.;
- Diendorfer, T.;
- Masel, E. K.;
- Kirchheiner, K.
- Article
9
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 2, p. 110, doi. 10.18372/2225-5036.25.13841
- Milov, Oleksandr;
- Kazakova, Nadiia;
- Milczarski, Piotr;
- Korol, Olha
- Article
10
- Applied Sciences (2076-3417), 2020, v. 10, n. 16, p. 5702, doi. 10.3390/app10165702
- Hatzivasilis, George;
- Ioannidis, Sotiris;
- Smyrlis, Michail;
- Spanoudakis, George;
- Frati, Fulvio;
- Goeke, Ludger;
- Hildebrandt, Torsten;
- Tsakirakis, George;
- Oikonomou, Fotis;
- Leftheriotis, George;
- Koshutanski, Hristo
- Article
11
- Academia & Derecho, 2019, v. 10, n. 18, p. 275, doi. 10.18041/2215-8944/academia.18.6004
- Higuera Jiménez, Diego Mauricio
- Article
12
- Electronics (2079-9292), 2021, v. 10, n. 22, p. 2748, doi. 10.3390/electronics10222748
- Song, Minkyu;
- Lee, Junyeon;
- Suh, Taeweon;
- Koo, Gunjae
- Article
13
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1957, doi. 10.3390/electronics9111957
- Shi, Yu;
- Fan, Cien;
- Zou, Lian;
- Sun, Caixia;
- Liu, Yifeng
- Article
14
- Probability in the Engineering & Informational Sciences, 2016, v. 30, n. 3, p. 492, doi. 10.1017/S0269964816000139
- PEREL, EFRAT;
- YECHIALI, URI
- Article
15
- Information Security Journal: A Global Perspective, 2020, v. 29, n. 1, p. 14, doi. 10.1080/19393555.2020.1716117
- Shah, Junaid Latief;
- Bhat, Heena Farooq
- Article
16
- Wireless Personal Communications, 2020, v. 113, n. 2, p. 977, doi. 10.1007/s11277-020-07263-9
- Sejaphala, Lanka Chris;
- Velempini, Mthulisi
- Article
17
- Wireless Personal Communications, 2019, v. 107, n. 2, p. 1041, doi. 10.1007/s11277-019-06316-y
- Gupta, Ruchika;
- Rao, Udai Pratap
- Article
18
- Sensors (14248220), 2016, v. 16, n. 1, p. 37, doi. 10.3390/s16010037
- Shahzad, Aamir;
- Lee, Malrey;
- Suntae Kim;
- Kangmin Kim;
- Jae-Young Choi;
- Younghwa Cho;
- Keun-Kwang Lee
- Article
19
- Journal of Intelligent Information Systems, 2020, v. 54, n. 2, p. 341, doi. 10.1007/s10844-019-00553-0
- Jahani, Hojjat;
- Jalili, Saeed
- Article
20
- Kurdistan Journal of Applied Research (KJAR), 2020, v. 5, n. 1, p. 164, doi. 10.24017/science.2020.1.12
- Hasan, Dana;
- Amin, Rebeen R. Hama;
- Hussin, Masnida
- Article
21
- Reliability: Theory & Applications, 2021, v. 16, n. 1, p. 13
- Kharchenko, V. S.;
- Yastrebenetsky, M. A.
- Article
22
- Multimedia Tools & Applications, 2018, v. 77, n. 13, p. 16447, doi. 10.1007/s11042-017-5214-8
- Srivastava, Rohini;
- Kumar, Basant;
- Singh, Amit Kumar;
- Mohan, Anand
- Article
23
- PLoS ONE, 2021, v. 16, n. 3, p. 1, doi. 10.1371/journal.pone.0249273
- Yavneh, Amir;
- Lothan, Roy;
- Yamin, Dan
- Article
24
- Sensors (14248220), 2021, v. 21, n. 15, p. 5189, doi. 10.3390/s21155189
- Pedreira, Vítor;
- Barros, Daniel;
- Pinto, Pedro
- Article
25
- Sensors (14248220), 2021, v. 21, n. 13, p. 4440, doi. 10.3390/s21134440
- Pinheiro, Alexandre;
- Canedo, Edna Dias;
- Albuquerque, Robson de Oliveira;
- de Sousa Júnior, Rafael Timóteo
- Article
26
- Sensors (14248220), 2019, v. 19, n. 18, p. 4007, doi. 10.3390/s19184007
- Basan, Elena;
- Basan, Alexandr;
- Nekrasov, Alexey
- Article
27
- Wireless Personal Communications, 2015, v. 84, n. 4, p. 2927, doi. 10.1007/s11277-015-2773-8
- Aggarwal, Parag;
- Trivedi, Aditya
- Article
28
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00049-3
- Xu, Hui;
- Zhou, Yangfan;
- Ming, Jiang;
- Lyu, Michael
- Article
29
- International Journal on Software Tools for Technology Transfer, 2021, v. 23, n. 1, p. 105, doi. 10.1007/s10009-020-00594-9
- Shakhov, Vladimir;
- Koo, Insoo
- Article
30
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8882200
- Wang, Shuo;
- Pei, Qingqi;
- Zhang, Yuchen;
- Liu, Xiaohu;
- Tang, Guangming
- Article
31
- Neural Computing & Applications, 2020, v. 32, n. 23, p. 17169, doi. 10.1007/s00521-020-04914-7
- Zhao, Feng;
- Zhang, Hao;
- Peng, Jia;
- Zhuang, Xiaohong;
- Na, Sang-Gyun
- Article
32
- Psychometrika, 2015, v. 80, n. 1, p. 101, doi. 10.1007/s11336-013-9373-x
- Hwang, Heungsun;
- Suk, Hye;
- Takane, Yoshio;
- Lee, Jang-Han;
- Lim, Jooseop
- Article
33
- Air & Space Power Journal, 2016, v. 30, n. 4, p. 69
- Article
34
- Information (2078-2489), 2021, v. 12, n. 9, p. 375, doi. 10.3390/info12090375
- Bourou, Stavroula;
- El Saer, Andreas;
- Velivassaki, Terpsichori-Helen;
- Voulkidis, Artemis;
- Zahariadis, Theodore
- Article
35
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 3, p. 1207, doi. 10.1007/s12083-021-01084-8
- Zhang, Yipin;
- Chang, Xiaolin;
- Mišić, Jelena;
- Mišić, Vojislav B.;
- Cai, Yutong
- Article
36
- International Journal of Advanced Research in Computer Science, 2020, v. 11, n. 1, p. 11, doi. 10.26483/ijarcs.v11i1.6502
- Al-Matarneh, Feras Mohammed
- Article