nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addressing the valuation problem in multi-round combinatorial auctions
|
Chakraborty, Soumyakanti |
|
2014 |
17 |
5 |
p. 1145-1160 |
artikel |
2 |
Advances in secure knowledge management in the big data era
|
Hota, Chittaranjan |
|
2015 |
17 |
5 |
p. 983-986 |
artikel |
3 |
Analysis of a multistage attack embedded in a video file
|
Nath, Hiran V. |
|
2015 |
17 |
5 |
p. 1029-1037 |
artikel |
4 |
Does better Internet access lead to more adoption? A new empirical study using household relocation
|
Ma, Junzhao |
|
2014 |
17 |
5 |
p. 1097-1110 |
artikel |
5 |
Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service
|
Kapoor, Kawaljeet Kaur |
|
2014 |
17 |
5 |
p. 1039-1056 |
artikel |
6 |
Game-theoretic strategies for IDS deployment in peer-to-peer networks
|
Narang, Pratik |
|
2015 |
17 |
5 |
p. 1017-1028 |
artikel |
7 |
How business process reengineering affects information technology investment and employee performance under different performance measurement
|
Huang, Shaio Yan |
|
2014 |
17 |
5 |
p. 1133-1144 |
artikel |
8 |
IPTV parental control: A collaborative model for the Social Web
|
Fernández-Vilas, Ana |
|
2014 |
17 |
5 |
p. 1161-1176 |
artikel |
9 |
Measurements of mislead threshold of company graph distortion
|
Huang, Shaio Yan |
|
2014 |
17 |
5 |
p. 1111-1132 |
artikel |
10 |
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013
|
Lee, Jaeung |
|
2015 |
17 |
5 |
p. 997-1005 |
artikel |
11 |
Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts
|
Hossain, Mohammad Alamgir |
|
2014 |
17 |
5 |
p. 1057-1076 |
artikel |
12 |
Secure and privacy preserving data processing support for active authentication
|
Sun, Yan |
|
2015 |
17 |
5 |
p. 1007-1015 |
artikel |
13 |
Social balance in signed networks
|
Zheng, Xiaolong |
|
2014 |
17 |
5 |
p. 1077-1095 |
artikel |
14 |
Surviving advanced persistent threats in a distributed environment – Architecture and analysis
|
Mehresh, Ruchika |
|
2015 |
17 |
5 |
p. 987-995 |
artikel |
15 |
Understanding health information technology adoption: A synthesis of literature from an activity perspective
|
Sun, Jun |
|
2014 |
17 |
5 |
p. 1177-1190 |
artikel |