Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             8 results found
no title author magazine year volume issue page(s) type
1 Bucket attack on numeric set watermarking model and safeguards Gupta, Gaurav
2011
16 2 p. 59-66
article
2 How much material on BitTorrent is infringing content? A case study Watters, Paul A.
2011
16 2 p. 79-87
article
3 Real-time detection of children’s skin on social networking sites using Markov random field modelling Islam, Mofakharul
2011
16 2 p. 51-58
article
4 Social networking as a nexus for engagement and exploitation of young people Quayle, Ethel
2011
16 2 p. 44-50
article
5 Social networking searching and privacy issues Qi, Man
2011
16 2 p. 74-78
article
6 Social networking threats Watters, Paul A.
2011
16 2 p. 37
article
7 Socio-technological phishing prevention Gupta, Gaurav
2011
16 2 p. 67-73
article
8 The threats of social networking: Old wine in new bottles? Weir, George R.S.
2011
16 2 p. 38-43
article
                             8 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands