Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
The Value of Intrusion Detection Systems in Information Technology Security Architecture
Cavusoglu, Huseyin, Mishra, Birendra, Raghunathan, Srinivasan
Published in Information systems research (01.03.2005)
Published in Information systems research (01.03.2005)
Get full text
Journal Article
Control of Flexible Software Development Under Uncertainty
Harris, Michael L, Collins, Rosann Webb, Hevner, Alan R
Published in Information systems research (01.09.2009)
Published in Information systems research (01.09.2009)
Get full text
Journal Article
The Choice of Sourcing Mechanisms for Business Processes
Tanriverdi, Huseyin, Konana, Prabhudev, Ge, Ling
Published in Information systems research (01.09.2007)
Published in Information systems research (01.09.2007)
Get full text
Journal Article
An Empirical Analysis of Network Externalities in Peer-to-Peer Music-Sharing Networks
Asvanund, Atip, Clay, Karen, Krishnan, Ramayya, Smith, Michael D
Published in Information systems research (01.06.2004)
Published in Information systems research (01.06.2004)
Get full text
Journal Article
Defending Critical Infrastructure
Brown, Gerald, Carlyle, Matthew, Salmeron, Javier, Wood, Kevin
Published in Interfaces (Providence) (01.11.2006)
Published in Interfaces (Providence) (01.11.2006)
Get full text
Journal Article