Language-Based Security for Malicious Mobile Code n/a n/a we have explored the application of programming language technology, i
![A systematic review on security in Process-Aware Information Systems – Constitution, challenges, and future directions - ScienceDirect A systematic review on security in Process-Aware Information Systems – Constitution, challenges, and future directions - ScienceDirect](https://ars.els-cdn.com/content/image/1-s2.0-S0950584913002334-fx1.jpg)
A systematic review on security in Process-Aware Information Systems – Constitution, challenges, and future directions - ScienceDirect
SCIENCE CITATION INDEX EXPANDEDанаCOMPUTER SCIENCE, INFORMATION SYSTEMSанаJOURNAL LIST Total journals: 144 1. A
Tree-based Group Key Agreement Yongdae Kim, Adrian Perrig, Gene Tsudik, in ACM Transactions on Information and System Security,
Contributors: Steven H. H. Ding, Concordia Institute for Information Systems Engineering, Concordia University Benjamin C. M. F
![University of Maryland 15th Annual Forum Highlights Research At Intersection of Cyber, Business, and Public Policy - ActiveCyber University of Maryland 15th Annual Forum Highlights Research At Intersection of Cyber, Business, and Public Policy - ActiveCyber](https://www.activecyber.net/wp-content/uploads/2019/01/Gordon-Loeb-Model-for-Cybersecurity-Investments-Summary-PowerPoint-Slide-1024x569.jpg)
University of Maryland 15th Annual Forum Highlights Research At Intersection of Cyber, Business, and Public Policy - ActiveCyber
![PDF) ACM Transactions on Management Information Systems Special Issue on Analytics for Cybersecurity and Privacy PDF) ACM Transactions on Management Information Systems Special Issue on Analytics for Cybersecurity and Privacy](https://i1.rgstatic.net/publication/334549118_ACM_Transactions_on_Management_Information_Systems_Special_Issue_on_Analytics_for_Cybersecurity_and_Privacy/links/5d30ca1c299bf1547cc25a0a/largepreview.png)