|
Research IRM InfoSci-OnDemand Powered Search
Keywords:
|
|
|
Subject:
|
|
|
Sort by:
|
Book Chapter
|
Rajesh K. Sharma
(2014).
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
32 pages.
|
Book Chapter
|
S.H. (Basie) von Solms, C.P. (Buks) Louwrens
(2006).
Digital Crime and Forensic Science in Cyberspace
24 pages.
|
Book Chapter
|
Hemalatha Jeyaprakash, KavithaDevi M. K., Geetha S.
(2018).
Handbook of Research on Network Forensics and Analysis Techniques
21 pages.
|
Journal Article
|
Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan
(2013).
International Journal of Digital Crime and Forensics
26 pages.
|
Journal Article
|
Marco Fontani, Tiziano Bianchi, Alessia De Rosa, Alessandro Piva, Mauro Barni
(2013).
International Journal of Digital Crime and Forensics
19 pages.
|
Journal Article
|
Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng
(2019).
International Journal of Digital Crime and Forensics
12 pages.
|
Journal Article
|
Reza Montasari, Richard Hill, Simon Parkinson, Pekka Peltola, Amin Hosseinian-Far, Alireza Daneshkhah
(2020).
International Journal of Organizational and Collective Intelligence
17 pages.
|
Book Chapter
|
Joseph Ricci, Ibrahim Baggili, Frank Breitinger
(2017).
Managing Security Issues and the Hidden Dangers of Wearable Technologies
27 pages.
|
Book Chapter
|
Joseph Ricci, Ibrahim Baggili, Frank Breitinger
(2018).
Wearable Technologies: Concepts, Methodologies, Tools, and Applications
21 pages.
|
Book Chapter
|
Hemalatha J, KavithaDevi M.K., Geetha S.
(2018).
Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management
18 pages.
|
Journal Article
|
Zhe Chen, Jicang Lu, Pengfei Yang, Xiangyang Luo
(2017).
International Journal of Digital Crime and Forensics
14 pages.
|
Book Chapter
|
Kouroush Jenab, Sam Khoury, Kim LaFevor
(2018).
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
29 pages.
|
Journal Article
|
Xianfeng Zhao, Jie Zhu, Haibo Yu
(2016).
International Journal of Digital Crime and Forensics
15 pages.
|
Journal Article
|
Kouroush Jenab, Sam Khoury, Kim LaFevor
(2016).
International Journal of Enterprise Information Systems
26 pages.
|
Book Chapter
|
Xianfeng Zhao, Jie Zhu, Haibo Yu
(2020).
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications
18 pages.
|
Journal Article
|
Ping Zhong, Mengdi Li, Kai Mu, Juan Wen, Yiming Xue
(2019).
International Journal of Digital Crime and Forensics
12 pages.
|
Book Chapter
|
Mariya Shafat Kirmani, Mohammad Tariq Banday
(2019).
Cryptographic Security Solutions for the Internet of Things
29 pages.
|
Journal Article
|
Zameer Gulzar, L. Arun Raj, A. Anny Leema
(2019).
International Journal of Information and Communication Technology Education
23 pages.
|
Book Chapter
|
Mariya Shafat Kirmani, Mohammad Tariq Banday
(2020).
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications
23 pages.
|
Journal Article
|
Udaya Sameer Venkata, Ruchira Naskar
(2018).
International Journal of Information Security and Privacy
16 pages.
|
Journal Article
|
Jie Zhu, Xianfeng Zhao, Qingxiao Guan
(2019).
International Journal of Digital Crime and Forensics
16 pages.
|
Journal Article
|
Zichi Wang, Zhaoxia Yin, Xinpeng Zhang
(2019).
International Journal of Digital Crime and Forensics
10 pages.
|
Journal Article
|
Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen
(2019).
International Journal of Digital Crime and Forensics
16 pages.
|
Book Chapter
|
Udaya Sameer Venkata, Ruchira Naskar
(2020).
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications
18 pages.
|
Book Chapter
|
Udaya Sameer Venkata, Ruchira Naskar
(2020).
Cognitive Analytics: Concepts, Methodologies, Tools, and Applications
17 pages.
|
|
|