4 results for information security.

Parameters for your search query:
Keyword     information security

Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data and Data-Driven Healthcare Systems
Journal of Business and Management Sciences. 2018, 6(3), 104-111. DOI: 10.12691/jbms-6-3-7
Pub. Date: June 29, 2018Views: 24660Downloads: 23224
Figure of 7
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data Analytics in Biometrics and Healthcare
Journal of Computer Sciences and Applications. 2018, 6(1), 48-55. DOI: 10.12691/jcsa-6-1-7
Pub. Date: June 04, 2018Views: 22847Downloads: 20835
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Telepsychiatry: Technology Progress, Challenges, and Language and Transcultural Issues
Journal of Translational Medicine and Developmental Disorders. 2014, 1(1), 1-11. DOI: 10.12691/jtmdd-1-1-1
Pub. Date: August 04, 2014Views: 20785Downloads: 14180
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes
Journal of Computer Networks. 2014, 2(2), 18-22. DOI: 10.12691/jcn-2-2-3
Pub. Date: June 10, 2014Views: 13713Downloads: 8137
This article belongs to the Special Issue Parallel computing and Protection Information
Results: sort by Relevance

Filter by


Published between:




Article Types