浏览/检索结果:共14条,第1-10条

已选(0)清除 条数/页:   排序方式:
A trustworthiness-based vehicular recruitment scheme for information collections in Distributed Networked Systems 期刊论文
Information Sciences,2021, 卷号: 545, 页码: 65-81
作者:  Li, Ting;  Liu, Anfeng;  Xiong, Neal N.;  Zhang, Shaobo;  Wang, Tian
收藏  |  浏览/下载:12/0  |  提交时间:2021/12/02
The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior 期刊论文
Information Technology and People,2019, 卷号: 32, 期号: 4, 页码: 973-992
作者:  Chen, Hao;  Chau, Patrick Y. K.;  Li, Wenli
收藏  |  浏览/下载:9/0  |  提交时间:2023/05/19
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid 会议论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Niagara Falls, U.S.A., JUL 11, 2018
作者:  Bhuiyan, Md Zakirul Alam;  Zaman, Mdaliuz;  Wang, Guojun;  Wang, Tian;  Rahman, Md Arafat
收藏  |  浏览/下载:8/0  |  提交时间:2021/12/02
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part II 专著
United States:Springer, 2017
作者:  Bouguettaya, Athman;  Gao, Yunjun;  Klimenko, Andrey;  Chen, Lu;  Zhang, Xiangliang
收藏  |  浏览/下载:18/0  |  提交时间:2021/09/30
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part I 专著
United States:Springer, 2017
作者:  Bouguettaya, Athman;  Gao, Yunjun;  Klimenko, Andrey;  Chen, Lu;  Zhang, Xiangliang
收藏  |  浏览/下载:12/0  |  提交时间:2021/09/30
Developing a typological theory using a quantitative approach: A case of information security deviant behavior 期刊论文
Communications of the Association for Information Systems,2015, 卷号: 37, 页码: 510-535
作者:  Chu, Amanda M. Y.;  Chau, Patrick Y. K.;  So, Mike K. P.
收藏  |  浏览/下载:6/0  |  提交时间:2023/05/19
Automated enforcement for relaxed information release with reference points 期刊论文
Science China Information Sciences,2014, 卷号: 57, 期号: 11, 页码: 1-19
作者:  Sun,Cong;  Xi,Ning;  Gao,Sheng;  Chen,Zhong;  Ma,Jian Feng
收藏  |  浏览/下载:4/0  |  提交时间:2025/08/05
Certificate-free ad hoc anonymous authentication 期刊论文
Information Sciences,2014, 卷号: 268, 页码: 447-457
作者:  Qin,Zhiguang;  Xiong,Hu;  Zhu,Guobin;  Chen,Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2025/08/05
Development and validation of instruments of information security deviant behavior 期刊论文
Decision Support Systems,2014, 卷号: 66, 页码: 93-101
作者:  Chu, Amanda M. Y.;  Chau, Patrick Y. K.
收藏  |  浏览/下载:8/0  |  提交时间:2023/05/19
New identity-based three-party authenticated key agreement protocol with provable security 期刊论文
Journal of Network and Computer Applications,2013, 卷号: 36, 期号: 2, 页码: 927-932
作者:  Xiong,Hu;  Chen,Zhong;  Li,Fagen
收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05