Your search for 14043 returns 3830 document(s) |
Security enhancement of route optimization in mobile IPv6 networks, page 1-19 |
Author: A. Mehdizadeh; S. Khatun; B. M. Ali; R.S.A. Abdullah; G. Kurup | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Proactive versus reactive security investments in the healthcare sector, page 451-471 |
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Quality competition and market segmentation in the security software market, page 589-606 |
Author: Debabrata Dey, Atanu Lahiri, and Guoying Zhang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toward a Unified Model of Information Security Policy Compliance, Page 285-311 |
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Are ontologies the nostrum to bridge the semantic GAP?. ( hal. 25) |
Author: Roland Wagner and Andreas Langegger; | Call Number: SEM-363 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Advances in computers vol. 25/ Marshall C. Yovits |
Call Number: 371.334 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Coverage, Relevance, and Ranking: The Impact of Query Operators on Web Search Engine Results, page 383-411 |
Author: C. M. Eastman, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Region Proximity in Metric Spaces and Its Use for Approximate Similarity Search, page 192-227 |
Author: G. Amato, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Researchess develop new search techniques* fake networks decoy hackers* vendors begin laser networking, page 19 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attention-based dynamic visual search using Inner-scene similarity: algorithms and bounds, page 251 |
Author: T. Avraham | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|