nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A decision support system for locating VHF/UHF radio jammer systems on the terrain
|
Gencer, Cevriye |
|
2007 |
10 |
1 |
p. 111-124 |
artikel |
2 |
A scalable multi-level feature extraction technique to detect malicious executables
|
Masud, Mohammad M. |
|
2007 |
10 |
1 |
p. 33-45 |
artikel |
3 |
Building effective online game websites with knowledge-based trust
|
Holsapple, Clyde W. |
|
2007 |
10 |
1 |
p. 47-60 |
artikel |
4 |
Editorial
|
Ramesh, R. |
|
2008 |
10 |
1 |
p. 1-2 |
artikel |
5 |
Formalising theories of trust for authentication protocols
|
Ma, Ji |
|
2007 |
10 |
1 |
p. 19-32 |
artikel |
6 |
Market reaction to patent infringement litigations in the information technology industry
|
Raghu, T. S. |
|
2007 |
10 |
1 |
p. 61-75 |
artikel |
7 |
Spectrum acquisition strategies adopted by wireless carriers in the USA
|
Sabat, Hemant K. |
|
2007 |
10 |
1 |
p. 77-102 |
artikel |
8 |
Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading
|
Jerman-Blažič, Borka |
|
2007 |
10 |
1 |
p. 103-110 |
artikel |
9 |
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation
|
Sipior, Janice C. |
|
2007 |
10 |
1 |
p. 3-18 |
artikel |