6 results for information security.

Parameters for your search query:
Keyword    information security

Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data and Data-Driven Healthcare Systems
Journal of Business and Management Sciences. 2018, 6(3), 104-111. DOI: 10.12691/jbms-6-3-7
Pub. Date: June 29, 2018Views: 23313Downloads: 22068
Figure of 7
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data Analytics in Biometrics and Healthcare
Journal of Computer Sciences and Applications. 2018, 6(1), 48-55. DOI: 10.12691/jcsa-6-1-7
Pub. Date: June 04, 2018Views: 21643Downloads: 19869
Open AccessArticle
Export: RIS | BibTeX | EndNote
Enhanced Anonymous Tag Based Credentials
Information Security and Computer Fraud. 2014, 2(1), 10-20. DOI: 10.12691/iscf-2-1-3
Pub. Date: March 24, 2014Views: 13843Downloads: 8891
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Telepsychiatry: Technology Progress, Challenges, and Language and Transcultural Issues
Journal of Translational Medicine and Developmental Disorders. 2014, 1(1), 1-11. DOI: 10.12691/jtmdd-1-1-1
Pub. Date: August 04, 2014Views: 20113Downloads: 13713
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Information Security of Kazakh Airlines
Journal of Computer Networks. 2014, 2(2), 23-25. DOI: 10.12691/jcn-2-2-4
Pub. Date: June 10, 2014Views: 10832Downloads: 6104
This article belongs to the Special Issue Parallel computing and Protection Information
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes
Journal of Computer Networks. 2014, 2(2), 18-22. DOI: 10.12691/jcn-2-2-3
Pub. Date: June 10, 2014Views: 13103Downloads: 7674
This article belongs to the Special Issue Parallel computing and Protection Information
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects



Journals





Article Types