7 research outputs found
Information Security Policy in E-Government Management: Two Case Studies on Internal Revenue Service and Virtual Election System
- Author
- Publication venue
- 'Elsevier BV'
- Publication date
- 01/01/2011
- Field of study
System Routines in Industrial Control
- Author
- Publication venue
- 'Elsevier BV'
- Publication date
- 01/01/2008
- Field of study
Data Communications in Distributed Control System
- Author
- About
- Aher
- Any Bus
- Beidler
- Bieniawski
- Books
- CiA
- CiA
- Cisco
- Computer Hope
- Control Net
- CSSE 433–522
- Dorman
- Dunreuil
- D’Andrea
- EECC694-Shaaban
- Fair Com
- FAQ
- Freebsd
- Hewitt-Packard
- HITEX
- IBM
- Industrial Networking
- Levine
- Linktionary
- Microsoft
- Microsoft TechNet
- Murphy
- Murphy
- Nader
- Netio
- Newmarch
- OMEGA
- PARC
- Peking University Computer Centre
- Prince
- PROTOCOLS
- Sinopoll
- Softing
- Strangio
- Syme
- Teach Target
- Teach Target
- Toncich
- Vondrak
- Webopedia
- Yu
- Zhang
- Zurawski
- Publication venue
- 'Elsevier BV'
- Publication date
- 01/01/2008
- Field of study
Vehicle Ad Hoc Network (VANET): Safety Benefits and Security Challenges
- Author
- A Rawat
- A Vinel
- C Lochert
- Car-To-Car Website
- E Schoch
- E-Zpass Website
- G Dhillon
- H Hartenstein
- I W H Ho
- J Isaac
- J Lee
- J Liu
- J M Anderson
- J Mittag
- L Le
- M Boban
- M Boban
- M M Butt
- M Raya
- M Schulze
- Microsoft Technet Website
- N Schtickzelle
- P M Martin
- Patrick I. Offor
- R Meireles
- S Chandra
- S Yousefi
- T D Little
- T Spyropoulos
- Techstreet Website
- W Enkelmann
- Y Liu
- Y Peng
- Y Qian
- Publication venue
- 'Elsevier BV'
- Publication date
- 01/01/2012
- Field of study
Spiffy
- Author
- Amani Sidney
- Angela Demke Brown
- Ashvin Goel
- Bairavasundaram Lakshmi N.
- Bangert Julian
- Beazley David
- Buckeye Brian
- Chow Michael
- Danial Al
- Daniel Fryer
- Gamma Erich
- Gunawi Haryadi S.
- Gunawi Haryadi S.
- Joseph Chu
- Kuei Sun
- Lamport Leslie
- Lee Changman
- Lu Lanyue
- Ma Ao
- Matthew Lakier
- Mesnier Michael
- Overstreet Kent
- Patterson Meredith
- Russell Wang
- Sagar Patel
- Sivathanu Gopalan
- Sivathanu Muthian
- Sivathanu Muthian
- TechNet Microsoft
- Torvalds Linus
- Ts’o Theodore
- Warren Tom
- Wilson Andrew
- Zalewski Michal
- Zhao Xu
- Zhou F.
- Publication venue
- 'Association for Computing Machinery (ACM)'
- Publication date
- Field of study
Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?
- Author
- Adams J. M.
- Anderson R.
- Baker G. D.
- Barrett N.
- Central Intelligence Agency
- Colombell M. R.
- Computer Crime
- Davis B. S.
- Day J. C.
- Denning D. E.
- Denning P. J.
- Dickey K.
- Dyson J.
- Furnell S.
- Gemignani M.
- Gordon L. W.
- Gordon S.
- Gregory J. DeLone
- Hansen R. L.
- Hollinger R. C.
- Jacobson H.
- Kaspersky Lab
- Keizer G.
- Kumar V. A.
- Lemos R.
- Livingston B.
- Lorine A. Hughes
- Marion C. C.
- May M.
- McCall C.
- McCollum T.
- Microsoft TechNet
- Montana J. C.
- Montz L. B.
- National Infrastructure Protection Center
- Parker D. B.
- Pethia R. D.
- Pew Internet
- Powell B.
- Raskin X.
- Ratliff E.
- Schmalleger F.
- Shimeall T.
- Smith G.
- Sokolik S. L.
- Spafford E. H.
- Stambaugh H.
- Staniford S.
- Stephenson P.
- Taber J. K.
- Taylor R. W.
- The nutty professors
- Tramontana J.
- Trend Micro
- U.S. Department of Commerce
- U.S. Department of Justice
- Vamosi R.
- Wall D. S.
- Wall D. S.
- Wall D. S.
- Weaver N. C.
- Wolfgang M. E.
- Yasin R.
- Young L. F.
- Publication venue
- 'SAGE Publications'
- Publication date
- Field of study