Zum Hauptinhalt springen

Suchergebnisse

Katalog
Ermittle Trefferzahl…

Discovery Service
131 Treffer

Suchmaske

Suchtipp für den Bereich Discovery Service: Wörter werden automatisch mit UND verknüpft. Eine ODER-Verknüpfung erreicht man mit dem Zeichen "|", eine NICHT-Verknüpfung mit einem "-" (Minus) vor einem Wort. Anführungszeichen ermöglichen eine Phrasensuche.
Beispiele: (burg | schloss) -mittelalter, "berufliche bildung"

Suchergebnisse einschränken oder erweitern

Erscheinungszeitraum

Mehr Treffer

Weniger Treffer

Thema

Verlag

Publikation

Inhaltsanbieter

131 Treffer

Sortierung: 
  1. S. V. Mahesh Kumar ; Gunasundari, R.
    In: Medical & Biological Engineering & Computing, Jg. 61 (2023-01-03), S. 593-615
    Online unknown
    Siehe Detailanzeige für Volltext
  2. Vineth Ligi Sivalingam ; Dhanalakshmi, Samiappan ; et al.
    In: Journal of Healthcare Engineering, Jg. 2022 (2022-02-23), S. 1-25
    unknown
  3. Hemaram, Surendra ; Jai Narayan Tripathi
    In: IEEE Electromagnetic Compatibility Magazine, Jg. 11 (2022), S. 49-59
    Online unknown
  4. Venkateshwarla Rama Raju
    In: IP Indian Journal of Neurosciences, Jg. 7 (2021-07-15), S. 156-163
    unknown
  5. Antônio Carlos Silva Júnior ; Isabela Castro Sant’Anna ; et al.
    2022
    unknown
  6. Mathew, Alex ; K Martin Sagayam
    In: 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), 2022-04-21
    unknown
  7. Lokesh Kumar Sahu ; Prafulla Kumar Vyas ; et al.
    2022
    unknown
  8. Olatunji, Sunday O. ; Alotaibi, Sarah ; et al.
    In: SSRN Electronic Journal, 2022
    unknown
  9. Bello, Rafael ; García, María M. ; et al.
    2022
    unknown
  10. Rohmingthangi, Gospel ; Kypacharili, F. C. ; et al.
    2022
    unknown
  11. null Valéry Tusambila Wadi ; null Özkan Özmen ; et al.
    2021
    unknown
  12. Sanchez-Gendriz, Ignacio ; Gustavo Fontoura de Souza ; et al.
    In: Scientific reports, Jg. 12 (2021-10-29), Heft 1
    unknown
  13. Md. Rahat Hossain ; Md. Milon Islam ; et al.
    In: IETE Journal of Research, Jg. 68 (2020-01-21), S. 2488-2507
    unknown
  14. Kulkarni, Vaishali R. ; Desai, Veena ; et al.
    In: International Journal of Sensors, Wireless Communications and Control, Jg. 9 (2019-10-25), S. 224-236
    unknown
  15. ed. by E. G. Popkova. – Cham : Springer Science + Business Media, 2019. – (Studies in Computational Intelligence ; vol. 826))
    In: Legal Concept, 2019-10-01, S. 154-166
    unknown
  16. Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80
    Emad Al Khoufi
    In: Basic and Applied Sciences - Scientific Journal of King Faisal University, Jg. 22 (2021)
    unknown
  17. aygri, null
    2021
    unknown
  18. S V Mahesh, Kumar ; R, Gunasundari
    In: Medicalbiological engineeringcomputingReferences, 2021-04-21
    unknown
  19. Volosencu, Constantin
    In: Mathematics, Jg. 10 (2022-04-03), S. 1157
    unknown
  20. Antônio Carlos da Silva Júnior ; Isabela Castro Sant’Anna ; et al.
    In: SSRN Electronic Journal, 2021
    unknown

Weitere Kataloge

xs 0 - 576
sm 576 - 768
md 768 - 992
lg 992 - 1200
xl 1200 - 1366
xxl 1366 -