Filter your results
- 5
- 5
- 5
- 5
- 3
- 1
- 10
- 2
- 4
- 5
- 16
- 4
- 14
- 5
- 1
- 1
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Website Customization: Exploring a Tag-Based Approach in the Australian Banking Context13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.434-437, ⟨10.1007/978-3-642-23768-3_51⟩
Conference papers
hal-01597038v1
|
||
|
Ceremony Analysis: Strengths and Weaknesses26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.104-115, ⟨10.1007/978-3-642-21424-0_9⟩
Conference papers
hal-01567584v1
|
||
|
Detecting Collusive Fraud in Enterprise Resource Planning Systems7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.143-153, ⟨10.1007/978-3-642-24212-0_11⟩
Conference papers
hal-01569559v1
|
||
|
Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.524-532, ⟨10.1007/978-3-642-23771-3_39⟩
Conference papers
hal-01590856v1
|
||
|
Fast Content-Based File Type Identification7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.65-75, ⟨10.1007/978-3-642-24212-0_5⟩
Conference papers
hal-01569553v1
|