Works matching Security systems industry
1
- Logistics (2305-6290), 2024, v. 8, n. 4, p. 98, doi. 10.3390/logistics8040098
- Chlomoudis, Constantinos;
- Kostagiolas, Petros;
- Pallis, Petros;
- Platias, Charalampos
- Article
2
- Ingénierie des Systèmes d'Information, 2023, v. 28, n. 3, p. 595, doi. 10.18280/isi.280307
- Todoshchuk, Andrew;
- Motorniuk, Uliana;
- Skliaruk, Tetiana;
- Oliinyk, Ihor;
- Kornieieva, Tetiana
- Article
3
- Journal of Software: Evolution & Process, 2023, v. 35, n. 7, p. 1, doi. 10.1002/smr.2494
- Lampropoulos, Georgios;
- Siakas, Kerstin
- Article
4
- Journal of Central China Normal University, 2023, v. 57, n. 1, p. 1, doi. 10.19603/j.cnki.1000-1190.2023.01.001
- Article
5
- Wireless Networks (10220038), 2025, v. 31, n. 2, p. 983, doi. 10.1007/s11276-024-03770-w
- Yuman, Yang;
- Goyal, S. B.;
- Rajawat, Anand Singh;
- Kumar, Manoj;
- Shankar, Achyut;
- Alhayan, Fatimah;
- Basheer, Shakila
- Article
6
- Sustainability (2071-1050), 2021, v. 13, n. 19, p. 10693, doi. 10.3390/su131910693
- Ko, Young Dae;
- Song, Byung Duk
- Article
7
- Cotton Textile Technology, 2023, v. 51, n. 622, p. 33
- Article
8
- Applied Sciences (2076-3417), 2021, v. 11, n. 16, p. 7754, doi. 10.3390/app11167754
- Jung, Sung-Woon;
- Kwon, Hyuk-Ju;
- Lee, Sung-Hak
- Article
10
- Homeland Defense Journal, 2007, v. 5, n. 10, p. 45
- Article
11
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 8
- Article
12
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 6
- Article
13
- Journal of Function Spaces, 2022, p. 1, doi. 10.1155/2022/8596540
- Yuan, Ling;
- Sun, Shan-Hui;
- Cai, Zheng-Qun
- Article
14
- Military Engineer / Hadmérnök, 2024, v. 19, n. 3, p. 137, doi. 10.32567/hm.2024.3.9
- Ottó, Ináncsi Mátyás;
- Máté, Dub
- Article
15
- Journal of Electrical & Computer Engineering, 2022, p. 1, doi. 10.1155/2022/8612174
- Wei, Zhenqiang;
- Dong, Shaohua;
- Wang, Xuchu
- Article
16
- Problems of Economy, 2021, v. 48, n. 3, p. 147, doi. 10.32983/2222-0712-2021-3-147-152
- Article
17
- Journal of Information Systems, 2006, v. 20, n. 1, p. 187, doi. 10.2308/jis.2006.20.1.187
- Article
18
- Processes, 2023, v. 11, n. 8, p. 2286, doi. 10.3390/pr11082286
- Hui, Xiangwei;
- Qi, Ming;
- Wang, Wenhao;
- Yang, Sen;
- Zhang, Chengqi
- Article
19
- Information (2078-2489), 2023, v. 14, n. 12, p. 666, doi. 10.3390/info14120666
- Article
20
- Issues in Ethnology Anthropology, 2014, v. 9, n. 1, p. 105
- Article
21
- Policy & Society, 2011, v. 30, n. 3, p. 221, doi. 10.1016/j.polsoc.2011.07.006
- Article
22
- Australian Journal of International Affairs, 2009, v. 63, n. 3, p. 390, doi. 10.1080/10357710903104851
- Article
23
- Critique: Journal of Socialist Theory, 2007, v. 35, n. 3, p. 339, doi. 10.1080/03017600701676738
- Article
24
- Advanced Functional Materials, 2014, v. 24, n. 22, p. 3299, doi. 10.1002/adfm.201303874
- Honda, Wataru;
- Harada, Shingo;
- Arie, Takayuki;
- Akita, Seiji;
- Takei, Kuniharu
- Article
25
- ISSA Journal, 2017, v. 15, n. 4, p. 16
- Article
26
- ISSA Journal, 2017, v. 15, n. 4, p. 9
- Article
27
- Africa Research Bulletin: Political, Social & Cultural Series, 2005, v. 42, n. 2, p. 16124
- Article
28
- International Journal of Communication Systems, 2009, v. 22, n. 8, p. 1023, doi. 10.1002/dac.1018
- Callegari, Christian;
- Garroppo, Rosario G.;
- Giordano, Stefano;
- Pagano, Michele
- Article
29
- International Journal of Communication Systems, 2009, v. 22, n. 5, p. 565, doi. 10.1002/dac.983
- Hung-Yu Chien;
- Tzu-Hang Hsu
- Article
30
- International Journal of Communication Systems, 2007, v. 20, n. 8, p. 909, doi. 10.1002/dac.840
- Congzhe Zhang;
- MengChu Zhou;
- Ming Yu
- Article
31
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/834245
- Ju Ren;
- Yaoxue Zhang;
- Kang Liu
- Article
32
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/469076
- Fei Wang;
- Yongjun Xu;
- Lin Wu;
- Longyijia Li;
- Dan Liu;
- Liehuang Zhu
- Article
33
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/406061
- Yiying Zhang;
- Chunying Wu;
- Jinping Cao;
- Xiangzhen Li
- Article
34
- International Journal of Distributed Sensor Networks, 2005, v. 1, n. 2, p. 187, doi. 10.1080/15501320590966440
- Olariu, S.;
- Xu, Q.;
- Eltoweissy, M.;
- Wadaa, A.;
- Zomaya, A. Y.
- Article
35
- Strategic Finance, 2004, v. 85, n. 8, p. 55
- Article
36
- Strategic Finance, 2003, v. 85, n. 4, p. 72
- Article
37
- Criminology & Criminal Justice: An International Journal, 2006, v. 6, n. 3, p. 267, doi. 10.1177/1748895806065530
- Article
38
- ITNOW, 2014, v. 56, n. 1, p. 26, doi. 10.1093/itnow/bwu012
- Article
39
- ITNOW, 2007, v. 49, n. 3, p. 6, doi. 10.1093/itnow/bwl128
- Article
40
- Debates IESA, 2013, v. 18, n. 4, p. 71
- Article
41
- European Competition & Regulatory Law Review, 2018, v. 2, n. 4, p. 296, doi. 10.21552/core/2018/4/10
- Møller, Marianne Henne;
- Klevstrand, Simen
- Article
42
- European Data Protection Law Review (EDPL), 2018, v. 4, n. 4, p. 296, doi. 10.21552/core/2018/4/10
- Møller, Marianne Henne;
- Klevstrand, Simen
- Article
43
- European Journal on Criminal Policy & Research, 1999, v. 7, n. 2, p. 143, doi. 10.1023/A:1008701310152
- Article
44
- European Journal on Criminal Policy & Research, 1999, v. 7, n. 2, p. 139, doi. 10.1023/A:1008790926082
- Article
45
- Issues in Information Systems, 2013, v. 14, n. 2, p. 444
- Rice, Erich;
- Safonov, Paul;
- Guster, Dennis
- Article
46
- Journal of Engineering (2314-4912), 2021, p. 1, doi. 10.1155/2021/4690611
- Kisembo, Isaac Moses;
- Ocen, Gilbert Gilibrays;
- Bongomin, Ocident;
- Alunyu, Andrew Egwar;
- Nibikora, Ildephonse;
- Matovu, Davis;
- Bwire, Felix
- Article
47
- Business Management Dynamics, 2018, v. 7, n. 7, p. 19
- Melo de Souza, Cinamor Silva Pessoa;
- da Silva Souza, José Antônio
- Article
48
- Business Management Dynamics, 2017, v. 6, n. 7, p. 19
- de Souza, Cinamor Silva Pessoa Melo;
- da Silva Souza, José Antônio
- Article
49
- Journal of Information Assurance & Security, 2013, v. 8, n. 6, p. 250
- Fathinavid, Amirhosein;
- Aghababa, Amir Bagheri;
- Eraghi, Alireza Enami;
- Farahani, A.
- Article
50
- Journal of Applied Security Research, 2015, v. 10, n. 2, p. 249, doi. 10.1080/19361610.2015.1004510
- Article