6 results for information security.

Parameters for your search query:
Keyword    information security

Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data and Data-Driven Healthcare Systems
Journal of Business and Management Sciences. 2018, 6(3), 104-111. DOI: 10.12691/jbms-6-3-7
Pub. Date: June 29, 2018Views: 40139Downloads: 39311
Figure of 7
Open AccessArticle
Export: RIS | BibTeX | EndNote
Big Data Analytics in Biometrics and Healthcare
Journal of Computer Sciences and Applications. 2018, 6(1), 48-55. DOI: 10.12691/jcsa-6-1-7
Pub. Date: June 04, 2018Views: 34310Downloads: 32643
Open AccessArticle
Export: RIS | BibTeX | EndNote
Enhanced Anonymous Tag Based Credentials
Information Security and Computer Fraud. 2014, 2(1), 10-20. DOI: 10.12691/iscf-2-1-3
Pub. Date: March 24, 2014Views: 23637Downloads: 19176
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Telepsychiatry: Technology Progress, Challenges, and Language and Transcultural Issues
Journal of Translational Medicine and Developmental Disorders. 2014, 1(1), 1-11. DOI: 10.12691/jtmdd-1-1-1
Pub. Date: August 04, 2014Views: 30100Downloads: 24214
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Information Security of Kazakh Airlines
Journal of Computer Networks. 2014, 2(2), 23-25. DOI: 10.12691/jcn-2-2-4
Pub. Date: June 10, 2014Views: 17494Downloads: 13277
This article belongs to the Special Issue Parallel computing and Protection Information
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes
Journal of Computer Networks. 2014, 2(2), 18-22. DOI: 10.12691/jcn-2-2-3
Pub. Date: June 10, 2014Views: 20960Downloads: 15798
This article belongs to the Special Issue Parallel computing and Protection Information
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects



Journals





Article Types