|
|
|
Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka and G. Priyalakshmi
Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components are we...
ver más
|
|
|
|
|
|
|
M. M. Fonseka,G-L. Tian,X. Yang,R. L.T.N. Rajapakse
AbstractThis paper investigates the effect of both FS and HR slack together on firm performance and how different levels of these slack resources affect performance of private-owned enterprises (POEs) and state-owned enterprises (SOEs). Hypotheses are te...
ver más
|
|
|
|
|
|
|
A Simm and G Y Tian
Pág. 320 - 325
|
|
|
|
|
|
|
J Wilson, G Y Tian, I Z Abidin, Suixian Yang and D Almond
Pág. 87
|
|
|
|
|
|
|
G. Liu, F. X. Tian, D. N. Warrington, S. Q. Zheng, Q. Zhang
Pág. 119 - 125
|
|
|
|
|
|
|
I Zainal Abidin, C Mandache, G Y Tian and Yong Li
Pág. 69 - 72
|
|
|
|
|
|
|
I Mukriz, G Y Tian and Yong Li
Pág. 21
|
|
|
|
|
|
|
W Du, G Wang, X Tian, A Humphries
Pág. 341
|
|
|
|
|
|
|
Tian, D.; Li, J.; AlRegib, G.
Pág. 1675 - 1685
|
|
|
|
|
|
|
Y Tian, L Lu, Y Fu, D Wang, G Li, A Yuan, Q Yuan, J Zhao
Pág. 767
|
|
|
|