Search ResultsSearch Results - SECURITIES

Showing 1 - 20 of 19,745,062 for search: 'SECURITIES', query time: 1.72s
Academic Journal

Authors:Schell, Roger R.1,2, schellr@ieee.org

Source:Communications of the ACM; Nov2016, Vol. 59 Issue 11, p20-23, 4p, 1 Color Photograph, 2 Diagrams

Academic Journal

Source:Communications of the ACM; Feb2017, Vol. 60 Issue 2, p18-20, 3p, 1 Color Photograph

Academic Journal

Authors:GEWALD, HEIKO1, heiko.gewald@hs-neu-ulm.de, XUEQUN WANG2, xuequnwang1600@gmail.com, WEEGER, ANDY3,4, Andy.Weeger@hs-neu-ulm.de, RAISINGHANI, MAHESH S.5, mraisinghani@twu.edu, GRANT, GERALD6, Gerald.Grant@carleton.ca, SANCHEZ, OTAVIO7, otavio.sanchez@fgv.br, PITTAYACHAWAN, SIDDHI8, siddhi.pittayachawan@rmit.edu.au

Source:Communications of the ACM; Oct2017, Vol. 60 Issue 10, p62-69, 8p, 1 Color Photograph, 2 Diagrams, 2 Charts

Academic Journal

Authors:MAZURCZYK, WOJCIECH1, wmazurczyk@tele.pw.edu.pl, WENDZEL, STEFFEN2, wendzel@hs-worms.de

Source:Communications of the ACM; Jan2018, Vol. 61 Issue 1, p86-94, 9p, 1 Black and White Photograph, 3 Diagrams, 1 Chart, 1 Graph

Academic Journal

Authors:Hart, Timothy Robert1, tim.hart@flinders.edu.au, de Vries, Denise2, denise.devries@flinders.edu.au

Source:Information Technology & Libraries; Dec2017, Vol. 36 Issue 4, p24-33, 10p, 1 Color Photograph

Academic Journal

Authors:ABADI, MARTÍN1, abadi@google.com, BLANCHET, BRUNO2, bruno.blanchet@inria.fr, FOURNET, CÉDRIC3, fournet@microsoft.com

Source:Journal of the ACM; Oct2017, Vol. 65 Issue 1, p1-1:41, 41p

Academic Journal

Authors:Angst, Corey M., cangst@nd.edu, Block, Emily S., eblock@ualberta.ca, D'Arcy, John, jdarcy@udel.edu, Kelley, Ken, kkelley@nd.edu

Source:MIS Quarterly; Sep2017, Vol. 41 Issue 3, p893-A8, 32p, 2 Diagrams, 10 Charts, 1 Graph

Periodical

Source:SC Magazine: For IT Security Professionals (15476693); Dec2017-Jan2018, Vol. 28 Issue 6, p24-27, 4p, 4 Color Photographs

Academic Journal

Source:International Journal of Advanced Research in Computer Science; Jul/Aug2017, Vol. 8 Issue 7, p820-827, 8p

Academic Journal

Authors:Manju1, Dhingra, Sunita2

Source:International Journal of Advanced Research in Computer Science; Jul/Aug2017, Vol. 8 Issue 7, p796-800, 5p

Academic Journal

Authors:Dezhi Han1, dzhan@shmtu.edu.cn, Kun Bi1, kunbi@shmtu.edu.cn, Han Liu1, jmakg23@163.com, Jianxin Jia1, onlyoneman@163.com

Source:Computer Science & Information Systems; 2017, Vol. 14 Issue 3, p769-788, 20p

Academic Journal

Authors:Lei Xu1, xuleinjust@yeah.net, Chungen Xu1, xuchung@njust.edu.cn, Xing Zhang2, zhangxing8928@gmail.com

Source:KSII Transactions on Internet & Information Systems; Sep2017, Vol. 11 Issue 9, p4624-4640, 17p, 3 Diagrams, 1 Chart, 1 Graph

Academic Journal

Authors:MACH, Vlastimil1, Vlastimil.Mach@fbi.uniza.sk, BOROŠ, Martin1, Martin.Boros@fbi.uniza.sk

Source:Key Engineering Materials; 2017, Vol. 755, p292-299, 8p

Academic Journal

Authors:YoHan Park1, KiSung Park2, KyungKeun Lee3, Hwangjun Song4, YoungHo Park2, parkyh@knu.ac.kr

Source:International Journal of Distributed Sensor Networks; Aug2017, Vol. 13 Issue 8, p1-12, 12p

Academic Journal

Authors:PEISERT, SEAN1,2,3, sppeisert@lbl.gov

Source:Communications of the ACM; Sep2017, Vol. 60 Issue 9, p72-80, 9p, 1 Color Photograph, 2 Diagrams

Academic Journal

Authors:REGEHR, JOHN1

Source:Communications of the ACM; Dec2017, Vol. 60 Issue 12, p48-50, 3p, 2 Illustrations

Academic Journal

Source:International Journal of Advanced Research in Computer Science; May/Jun2017, Vol. 8 Issue 5, p657-661, 5p

Periodical

Authors:Robinson, Teri

Source:SC Magazine: For IT Security Professionals (15476693); Oct2017, Vol. 28 Issue 5, p10-14, 5p, 6 Color Photographs