已选(0)清除
条数/页: 排序方式:
|
| Comparative Analysis of Energy-Efficient Scheduling Algorithms for Big Data Applications 期刊论文 IEEE ACCESS, 2018, 卷号: 6, 页码: 40073-40084 作者: Li, Hongjian; Wang, Huochen; Xiong, Anping; Lai, Jun; Tian, Wenhong![](/image/person.jpg)
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:29/0  |  提交时间:2018/09/25
|
| Cybercrime outbreak targets French banking customers. 期刊论文 Information-management.com, 2017, 页码: 30 -
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:1/0  |  提交时间:2019/12/31 |
| 新时期对网络信息窃取的安全管理对策研究 期刊论文 信息安全与通信保密, 2015 杨育
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:1/0  |  提交时间:2017/12/03
|
| Is Cybercrime one of the weakest links in Electronic Government? 期刊论文 Journal of International Commercial Law and Technology, 2011, 卷号: Vol.6 No.4, 页码: 243-249 作者: ShaliniKesar
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0  |  提交时间:2020/01/04
|
| 基于GIS的网络犯罪空间管理系统设计 期刊论文 2010, 2010 修文群; XIU Wen-qun
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0 |
| Cyber Crime Law in India: Has Law Kept Pace with Emerging Trends? An Empirical Study 期刊论文 Journal of International Commercial Law and Technology, 2010, 卷号: Vol.5 No.1, 页码: 22-28 作者: N.S.Nappinai
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
|
| Cyberforensics: Bridging the Law/ Technology Divide 期刊论文 Journal of Information, Law and Technology, 2009, 卷号: No.1 作者: AnnamartNieman
![](/themes/default/image/downing1.png) 收藏  |  浏览/下载:4/0  |  提交时间:2020/01/13
|