Author:
Bhardwaj Mohini,Singh Amar Jeet
Subject
Information Systems and Management,Computer Science Applications,Software
Reference8 articles.
1. Farahmand, F., Navathe, S.B., Sharp, G.P. and Enslow, P.H. Managing vulnerabilities of information systems to security incidents. Proceedings of the 5thInternational Conference on Electronic Commerce. pp.348–354.
2. Evaluation instrument for e-government websites
3. Ko, C.C. and Cheng, C.D. 2008.Flexible and secure computer-based assessment using a single zip disk. In Computer & Education, 915–926. Oxford: Elsevier Science Ltd.
4. Rizvi, S.J. and Harita, J.R. Maintaining data privacy in association rule mining.Proceeding of 28th International Conference on Very Large Databases. pp.682–693.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献