Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             16 results found
no title author magazine year volume issue page(s) type
1 Advances in Secure Knowledge Management in the Artificial Intelligence Era Sahay, Sanjay K.

23 4 p. 807-810
article
2 A Formal Specification of Access Control in Android with URI Permissions Talegaon, Samir

23 4 p. 849-866
article
3 An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm) Majumdar, Abhishek

23 4 p. 1039-1056
article
4 An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises Tran, Thi

23 4 p. 931-939
article
5 Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models Shyamasundar, R.K.

23 4 p. 811-833
article
6 Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union Elena-Bucea, Anca

23 4 p. 1007-1021
article
7 Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending? Chen, Qun

23 4 p. 963-986
article
8 Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2 Tamilmani, Kuttimani

23 4 p. 987-1005
article
9 Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats Baksi, Rudra P.

23 4 p. 897-913
article
10 Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations Vimalkumar, M

23 4 p. 1057-1076
article
11 Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage Pal, Abhipsa

23 4 p. 941-961
article
12 Predicting Sports Injuries with Wearable Technology and Data Analysis Zadeh, Amir

23 4 p. 1023-1037
article
13 Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System Limbasiya, Trupil

23 4 p. 835-848
article
14 Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning Rathore, Hemant

23 4 p. 867-882
article
15 Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence Haque, Md. Farhan

23 4 p. 883-896
article
16 UnderTracker: Generating Robust Binaries Using Execution Flow Traces Shrivastava, Rajesh Kumar

23 4 p. 915-930
article
                             16 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands