Works matching DE "SECURITY management"
1
- International Journal of Pattern Recognition & Artificial Intelligence, 2023, v. 37, n. 5, p. 1, doi. 10.1142/S0218001423560074
- Singh, Ashutosh;
- Singh, Yogendra Narain
- Article
2
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-06719-x
- Usha, G.;
- Karthikeyan, H.;
- Gautam, Kumar;
- Pachauri, Nikhil
- Article
3
- Applied Computer Science (1895-3735), 2025, v. 21, n. 2, p. 96, doi. 10.35784/acs_7397
- BAWANEH, Mohammed J.;
- AL-HAZAIMEH, Obaida M.;
- AL-NAWASHI, Malek M.;
- AL-BSOOL, Monther H.;
- HANANDAH, Essam
- Article
4
- Modelling, 2025, v. 6, n. 2, p. 44, doi. 10.3390/modelling6020044
- Li, Jingyi;
- Song, Yuqi;
- Tian, Chengliang;
- Tian, Weizhong
- Article
5
- Machine Learning & Knowledge Extraction, 2025, v. 7, n. 2, p. 32, doi. 10.3390/make7020032
- El Hajjar, Tamara;
- Lansari, Mohammed;
- Bellafqira, Reda;
- Coatrieux, Gouenou;
- Kapusta, Katarzyna;
- Kallas, Kassem
- Article
6
- Journal of Industrial Integration & Management, 2025, v. 10, n. 2, p. 341, doi. 10.1142/S2424862224500179
- Jyoti;
- Kesharwani, Subodh;
- Chaudhry, Sohail S.
- Article
7
- Traitement du Signal, 2025, v. 42, n. 3, p. 1661, doi. 10.18280/ts.420336
- Article
8
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-025-00380-7
- Gao, Birou;
- Zhang, Rui;
- Tao, Yang;
- Qin, Shihan
- Article
9
- Journal of Global Faultlines, 2025, v. 12, n. 1, p. 82, doi. 10.13169/jglobfaul.12.1.0006
- Article
10
- Symmetry (20738994), 2025, v. 17, n. 6, p. 820, doi. 10.3390/sym17060820
- Liu, Jinhui;
- Han, Tianyi;
- Zhao, Jingjing;
- Mu, Dejun;
- Liu, Huan;
- Tang, Bo
- Article
11
- WSQ: Women's Studies Quarterly, 2011, v. 39, n. 1/2, p. 95, doi. 10.1353/wsq.2011.0014
- Casper, Monica J.;
- Moore, Lisa Jean
- Article
12
- Annals of Library & Information Studies, 2012, v. 59, n. 4, p. 240
- Article
13
- New Zealand Journal of Applied Computing & Information Technology, 2010, v. 14, n. 1, p. 24
- Article
14
- Journal of African American Studies, 2007, v. 10, n. 4, p. 94, doi. 10.1007/s12111-007-9006-5
- Article
15
- Fraser Forum, 2005, p. 14
- Clemens, Jason;
- Veldhuis, Niels
- Article
16
- Australian Journal of International Affairs, 1993, v. 47, n. 2, p. 210, doi. 10.1080/10357719308445108
- Article
17
- Australian Journal of International Affairs, 1990, v. 44, n. 3, p. 269, doi. 10.1080/10357719008445040
- Article
18
- Society, 2007, v. 44, n. 2, p. 11, doi. 10.1007/BF02819921
- Article
19
- Society, 2000, v. 37, n. 6, p. 28, doi. 10.1007/s12115-000-1019-9
- Article
20
- Social Forces, 1930, v. 9, n. 1, p. 104, doi. 10.2307/2570093
- Article
21
- Journal of Chinese Political Science, 2006, v. 11, n. 1, p. 1, doi. 10.1007/BF02877031
- Article
22
- Qualitative Inquiry, 2009, v. 15, n. 10, p. 1552, doi. 10.1177/1077800409343069
- Goldstein, Tara;
- Wickett, Jocelyn
- Article
23
- Peace Review, 2022, v. 34, n. 1, p. 73, doi. 10.1080/10402659.2022.2023431
- Castrén, Joona;
- Hakala, Emma
- Article
24
- Peace Review, 2022, v. 34, n. 1, p. 22, doi. 10.1080/10402659.2022.2023426
- Article
25
- Peace Review, 2022, v. 34, n. 1, p. 1, doi. 10.1080/10402659.2022.2023424
- Article
26
- Peace Review, 2021, v. 33, n. 3, p. 361, doi. 10.1080/10402659.2021.1953799
- Article
27
- Peace Review, 2020, v. 32, n. 4, p. 521, doi. 10.1080/10402659.2020.1921415
- Article
29
- Peace Review, 2012, v. 24, n. 2, p. 163, doi. 10.1080/10402659.2012.677327
- Article
30
- Peace Review, 2004, v. 16, n. 1, p. 25, doi. 10.1080/1040265042000210111
- Article
31
- Innovation, 2006, v. 6, n. 1, p. 25
- Article
32
- Innovation, 2006, v. 6, n. 1, p. 7
- Article
33
- Journal of Correctional Education, 1996, v. 47, n. 2, p. 64
- Article
34
- Journal of Forensic Psychiatry & Psychology, 2022, v. 33, n. 2, p. 200, doi. 10.1080/14789949.2022.2044068
- Article
35
- International Tax & Public Finance, 2012, v. 19, n. 6, p. 819, doi. 10.1007/s10797-011-9209-5
- Article
36
- Loss Prevention Bulletin, 2019, n. 268, p. 2
- Article
38
- Loss Prevention Bulletin, 2012, n. 226, p. 4
- Article
39
- Loss Prevention Bulletin, 2008, n. 204, p. 29
- Article
40
- Loss Prevention Bulletin, 2008, n. 201, p. 16
- Dautun, C.;
- Tixier, J.;
- Chapelain, J.;
- Fontaine, F.;
- Dusserre, G.
- Article
41
- Loss Prevention Bulletin, 2007, v. 198, n. 1, p. 14
- Article
42
- 2020
- Hansson, Boel;
- Olsrud, Johan;
- Wilén, Jonna;
- Owman, Titti;
- Höglund, Peter;
- Björkman-Burtscher, Isabella M.
- journal article
43
- Stochastic Environmental Research & Risk Assessment, 2023, v. 37, n. 1, p. 73, doi. 10.1007/s00477-022-02274-3
- Ji, Juan;
- Chen, Junfei;
- Ding, Tonghui;
- Gu, Yan
- Article
44
- Environment & Security, 2024, v. 2, n. 4, p. 501, doi. 10.1177/27538796241287358
- Conca, Ken;
- Dabelko, Geoffrey D
- Article
45
- Africa Center Research Papers, 2019, p. 1
- Aning, Kwesi;
- Siegle, Joseph
- Article
46
- Occupational Medicine, 2010, v. 60, n. 5, p. 354, doi. 10.1093/occmed/kqp195
- Article
47
- Al-Hijr: Journal of Adulearn World, 2024, v. 3, n. 2, p. 310, doi. 10.55849/alhijr.v3i2.667
- Article
48
- FinanzRundschau, 2024, v. 106, n. 4, p. 196, doi. 10.9785/fr-2024-1060409
- Article
49
- International Journal of Information & Communication Technology Research (2251-6107), 2024, v. 16, n. 1, p. 20
- Khajouei-Nejad, Sedigheh;
- Javadi, Hamid Haj Seyyed;
- Jabbehdari, Sam;
- Moattar, Seyed Mohammad Hossein
- Article
50
- Manchester School (1463-6786), 2007, v. 75, n. 1, p. 104, doi. 10.1111/j.1467-9957.2007.01005.x
- BLACKSTONE, ERWIN A.;
- BUCK, ANDREW J.;
- HAKIM, SIMON;
- SPIEGEL, URIEL
- Article