Search Result Save to File Save as CSV
Your search for 25203 returns 4752 document(s)
Technology standards pros aid homeland security, page 104
Author: Kate M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Modified random perturbation method for database security, page 47
Author: Tendick, P. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Correlated failures, diversification, and information security risk management, page 397-422
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Proactive versus reactive security investments in the healthcare sector, page 451-471
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Quality competition and market segmentation in the security software market, page 589-606
Author: Debabrata Dey, Atanu Lahiri, and Guoying Zhang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Toward a Unified Model of Information Security Policy Compliance, Page 285-311
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Telecommunication networks coverage area expansion in disaster area using autonomous mobile robots: hardware and software implementation, Hal. 113-118
Author: E. Budianto; M.S> Lvissalim, A> Hafidh; A. Wibowo, W. Jatmiko; B. Hardian P. Mursanto; A. Muis; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Collaborative Filtering Based on Opportunistic Information Sharing in Mobile Ad-Hoc Networks (408-416)
Author: Alexandre de Spindler Moira C. Norrie Michael Grossniklaus; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Energy-Efficient Voronoi-Based Manycats in Wireless Sensor Networks with Mobile Skinks (V1-361 -- V1-365)
Author: Shiow-Fen Hwang Nai-Han Liang Kun Hsien Lu Chyi-Ren Dow; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next