nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advances in Secure Knowledge Management in the Artificial Intelligence Era
|
Sahay, Sanjay K. |
|
|
23 |
4 |
p. 807-810 |
artikel |
2 |
A Formal Specification of Access Control in Android with URI Permissions
|
Talegaon, Samir |
|
|
23 |
4 |
p. 849-866 |
artikel |
3 |
An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm)
|
Majumdar, Abhishek |
|
|
23 |
4 |
p. 1039-1056 |
artikel |
4 |
An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises
|
Tran, Thi |
|
|
23 |
4 |
p. 931-939 |
artikel |
5 |
Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models
|
Shyamasundar, R.K. |
|
|
23 |
4 |
p. 811-833 |
artikel |
6 |
Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union
|
Elena-Bucea, Anca |
|
|
23 |
4 |
p. 1007-1021 |
artikel |
7 |
Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending?
|
Chen, Qun |
|
|
23 |
4 |
p. 963-986 |
artikel |
8 |
Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2
|
Tamilmani, Kuttimani |
|
|
23 |
4 |
p. 987-1005 |
artikel |
9 |
Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
|
Baksi, Rudra P. |
|
|
23 |
4 |
p. 897-913 |
artikel |
10 |
Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations
|
Vimalkumar, M |
|
|
23 |
4 |
p. 1057-1076 |
artikel |
11 |
Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage
|
Pal, Abhipsa |
|
|
23 |
4 |
p. 941-961 |
artikel |
12 |
Predicting Sports Injuries with Wearable Technology and Data Analysis
|
Zadeh, Amir |
|
|
23 |
4 |
p. 1023-1037 |
artikel |
13 |
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System
|
Limbasiya, Trupil |
|
|
23 |
4 |
p. 835-848 |
artikel |
14 |
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning
|
Rathore, Hemant |
|
|
23 |
4 |
p. 867-882 |
artikel |
15 |
Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
|
Haque, Md. Farhan |
|
|
23 |
4 |
p. 883-896 |
artikel |
16 |
UnderTracker: Generating Robust Binaries Using Execution Flow Traces
|
Shrivastava, Rajesh Kumar |
|
|
23 |
4 |
p. 915-930 |
artikel |