16298 publications
- Information Retrieval Technology
- Information Retrieval Technology
- Information Retrieval Technology
- Information Retrieval Technology
- Information Retrieval Technology
- Information Retrieval Technology
- Information Retrieval Technology
- Information Retrieval Technology
- Information Retrieval and Hypertext
- Information Retrieval and Mining in Distributed Environments
- Information Retrieval and Natural Language Processing
- Information Retrieval for Music and Motion
- Information Retrieval in Bioinformatics
- Information Retrieval und Künstliche Intelligenz
- Information Retrieval — Eine Einführung
- Information Retrieval: A Biomedical and Health Perspective
- Information Retrieval: A Health Care Perspective
- Information Retrieval: Uncertainty and Logics
- Information Reuse and Integration in Academia and Industry
- Information Risk and Long-Run Performance of Initial Public Offerings
- Information Routing, Correspondence Finding, and Object Recognition in the Brain
- Information Science & Technology in China: A Roadmap to 2050
- Information Science and Applications
- Information Science and Applications
- Information Science and Applications
- Information Science and Applications (ICISA) 2016
- Information Science and Applications 2017
- Information Science and Applications 2018
- Information Science for Materials Discovery and Design
- Information Science in Action: System Design
- Information Science in Action: System Design
- Information Sciences and Systems 2013
- Information Sciences and Systems 2014
- Information Sciences and Systems 2015
- Information Search, Integration and Personalization
- Information Search, Integration and Personalization
- Information Search, Integration, and Personalization
- Information Search, Integration, and Personalization
- Information Search, Integration, and Personalization
- Information Search, Integration, and Personalization
- Information Search, Integration, and Personlization
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Applications
- Information Security Education - Adapting to the Fourth Industrial Revolution
- Information Security Education - Challenges in the Digital Age
- Information Security Education Across the Curriculum
- Information Security Education for Cyber Resilience
- Information Security Education for a Global Digital Society
- Information Security Education – Towards a Cybersecure Society
- Information Security Education. Education in Proactive Information Security
- Information Security Education. Information Security in Action
- Information Security Governance
- Information Security Management & Small Systems Security
- Information Security Management, Education and Privacy
- Information Security Planning
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practice and Experience
- Information Security Practices
- Information Security Risk Management
- Information Security Risk Management
- Information Security Technologies for Controlling Pandemics
- Information Security Technologies in the Decentralized Distributed Networks
- Information Security Technology for Applications
- Information Security Technology for Applications
- Information Security Theory and Practice
- Information Security Theory and Practice
- Information Security Theory and Practice
- Information Security Theory and Practice
- Information Security Theory and Practice
- Information Security Theory and Practice
- Information Security Theory and Practice. Securing the Internet of Things
- Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
- Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
- Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
- Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
- Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices
- Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems
- Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks
- Information Security and Assurance
- Information Security and Assurance
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology
- Information Security and Cryptology - ICISC 2003
- Information Security and Cryptology - ICISC 2005
- Information Security and Cryptology - ICISC 2007
- Information Security and Cryptology - ICISC 2010
- Information Security and Cryptology - ICISC 2011
- Information Security and Cryptology - ICISC 2014
- Information Security and Cryptology - ICISC 2015
- Information Security and Cryptology - ICISC’99
- Information Security and Cryptology -- ICISC 2013
- Information Security and Cryptology – ICISC 2004
- Information Security and Cryptology – ICISC 2006
- Information Security and Cryptology – ICISC 2008
- Information Security and Cryptology – ICISC 2012
- Information Security and Cryptology – ICISC 2016
- Information Security and Cryptology – ICISC 2017
- Information Security and Cryptology – ICISC 2018
- Information Security and Cryptology – ICISC 2019
- Information Security and Cryptology – ICISC 2020
- Information Security and Cryptology – ICISC 2021
- Information Security and Cryptology – ICISC 2022
- Information Security and Cryptology – ICISC 2023
- Information Security and Cryptology – ICISC 2023
- Information Security and Cryptology — ICISC 2000
- Information Security and Cryptology — ICISC 2001
- Information Security and Cryptology — ICISC 2002
- Information Security and Digital Forensics
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy
- Information Security and Privacy