Author:
Paul Prantosh,Aithal P. S.
Reference18 articles.
1. Open data, privacy, and fair information principles: Towards a balancing framework;F Z Borgesius;Berkeley Technology Law Journal,2015
2. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness;B Bulgurcu;MIS quarterly,2010
3. A database security course on a shoestring;B George;ACM SIGCSE Bulletin,2006
4. Android based mobile application development and its security;S Holla;International Journal of Computer Trends and Technology,2012
5. Efficient database generation for decision tree based power system security assessment;V Krishnan;IEEE Transactions on Power systems,2011
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Flutter Applications: A Comprehensive Study;2023 7th International Conference On Computing, Communication, Control And Automation (ICCUBEA);2023-08-18