Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Theory building is neither an art nor a science. It is a craftRivard, SuzanneJournal of information technology, 2021-09, Vol.36 (3), p.316-328 [Periódico revisado por pares]London, England: SAGE PublicationsTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
The theoretical basis of enterprise architecture: A critical review and taxonomy of relevant theoriesKotusev, Svyatoslav ; Kurnia, SherahJournal of information technology, 2021-09, Vol.36 (3), p.275-315 [Periódico revisado por pares]London, England: SAGE PublicationsTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
A copositive formulation for the stability number of infinite graphsDobre, Cristian ; Dür, Mirjam ; Frerick, Leonhard ; Vallentin, FrankMathematical programming, 2016-11, Vol.160 (1-2), p.65-83 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Team Boundary Spanning: Strategic Implications for the Implementation and use of Enterprise Social MediaVan Osch, Wietske ; Steinfield, Charles WJournal of information technology, 2016-06, Vol.31 (2), p.207-225 [Periódico revisado por pares]London, England: SAGE PublicationsTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
On heuristic bi-criterion methods for semi-obnoxious facility locationOrtigosa, P. M. ; Hendrix, E. M. T. ; Redondo, J. L.Computational optimization and applications, 2015-05, Vol.61 (1), p.205-217 [Periódico revisado por pares]Boston: Springer USTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Using instance-weighted naive Bayes for adapting concept drift in masquerade detectionSen, SevilInternational journal of information security, 2014-11, Vol.13 (6), p.583-590 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Anonymity guarantees of the UMTS/LTE authentication and connection protocolLee, Ming-Feng ; Smart, Nigel P. ; Warinschi, Bogdan ; Watson, Gaven J.International journal of information security, 2014-11, Vol.13 (6), p.513-527 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
A conceptual model of security contextJovanovikj, Vladimir ; Gabrijelčič, Dušan ; Klobučar, TomažInternational journal of information security, 2014-11, Vol.13 (6), p.571-581 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Data minimisation in communication protocols: a formal analysis framework and application to identity managementVeeningen, Meilof ; de Weger, Benne ; Zannone, NicolaInternational journal of information security, 2014-11, Vol.13 (6), p.529-569 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
AAnA: Anonymous authentication and authorization based on short traceable signaturesShin, Sooyeon ; Kwon, TaekyoungInternational journal of information security, 2014-10, Vol.13 (5), p.477-495 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |