Results 291 to 300 of about 2,693,777 (322)
Some of the next articles are maybe not open access.
Adopting an information security management system in a co-opetition strategy context
, 2014Dorothea Kossyva +3 more
semanticscholar +1 more source
European Conference on Software Process Improvement, 2009
Thierry Valdevit +2 more
semanticscholar +1 more source
Thierry Valdevit +2 more
semanticscholar +1 more source
The security of practical quantum key distribution
Reviews of Modern Physics, 2009Valerio Scarani +2 more
exaly
Security Services Using Blockchains: A State of the Art Survey
IEEE Communications Surveys and Tutorials, 2019Tara Salman +2 more
exaly
Cyber Security and Privacy Issues in Smart Grids
IEEE Communications Surveys and Tutorials, 2012Yang Xiao, Tieshan Li, Wei Liang
exaly
Chemical Sniffing Instrumentation for Security Applications
Chemical Reviews, 2016Stamatios Giannoukos +2 more
exaly
A Survey of Security in Software Defined Networks
IEEE Communications Surveys and Tutorials, 2016Sandra Scott-Hayward
exaly
SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective
IEEE Communications Surveys and Tutorials, 2020Avisha Das, Shahryar Baki, Rakesh Verma
exaly
Food Security: The Challenge of Feeding 9 Billion People
Science, 2010Lawrence Haddad, Jules N Pretty
exaly

