Search Results

There are 4283 results for: content related to: Human information security behaviors: Differences across geographies and cultures in a global user survey

  1. You have full text access to this OnlineOpen article
    Morphology and life history of the Great Slave Lake ciscoes (Salmoniformes: Coregonidae)

    Ecology of Freshwater Fish

    Volume 23, Issue 3, July 2014, Pages: 453–469, Andrew M. Muir, Paul Vecsei, Michael Power, Charles C. Krueger and James D. Reist

    Version of Record online : 30 SEP 2013, DOI: 10.1111/eff.12098

  2. Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 1, January 2015, Pages: 237–251, Dejan Dundjerski and Milo Tomašević

    Version of Record online : 18 FEB 2014, DOI: 10.1002/cpe.3223

  3. You have free access to this content

    VoIP Voice and Fax Signal Processing

    Sivannarayana Nagireddi, Pages: 498–516, 2008

    Published Online : 29 JAN 2008, DOI: 10.1002/9780470377871.biblio

  4. You have free access to this content

    IP, Ethernet and MPLS Networks

    André Perez, Pages: 255–258, 2013

    Published Online : 7 MAR 2013, DOI: 10.1002/9781118617298.biblio

  5. Voice over Internet Protocol (IP)

    Standard Article

    The Internet Encyclopedia

    Roy Morris

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie189

  6. Habitat coupling in a large lake system: delivery of an energy subsidy by an offshore planktivore to the nearshore zone of Lake Superior

    Freshwater Biology

    Volume 59, Issue 6, June 2014, Pages: 1197–1212, Jason D. Stockwell, Daniel L. Yule, Thomas R. Hrabik, Michael E. Sierszen and Edmund J. Isaac

    Version of Record online : 21 FEB 2014, DOI: 10.1111/fwb.12340

  7. Green Wired Networks

    Large-Scale Distributed Systems and Energy Efficiency: A Holistic View

    Alfonso Gazo Cervero, Michele Chincoli, Lars Dittmann, Andreas Fischer, Alberto E. Garcia, Jaime Galán-Jiménez, Laurent Lefevre, Hermann de Meer, Thierry Monteil, Paolo Monti, Anne-Cecile Orgerie, Louis-Francois Pau, Chris Phillips, Sergio Ricciardi, Remi Sharrock, Patricia Stolf, Tuan Trinh, Luca Valcarenghi, Pages: 41–80, 2015

    Published Online : 10 APR 2015, DOI: 10.1002/9781118981122.ch3

  8. Denial of Service Attacks

    Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, Volume 3

    Qijun Gu, Peng Liu, Pages: 454–468, 2012

    Published Online : 4 JAN 2012, DOI: 10.1002/9781118256107.ch29

  9. Ontogenetic shifts in morphology and resource use of cisco Coregonus artedi

    Journal of Fish Biology

    Volume 82, Issue 2, February 2013, Pages: 600–617, A. M. Muir, P. Vecsei, T. C. Pratt, C. C. Krueger, M. Power and J. D. Reist

    Version of Record online : 25 JAN 2013, DOI: 10.1111/jfb.12016

  10. Optimal redundancy allocation for high availability routers

    International Journal of Communication Systems

    Volume 23, Issue 12, December 2010, Pages: 1581–1599, Chia-Tai Tsai, Rong-Hong Jan and Kuochen Wang

    Version of Record online : 30 MAR 2010, DOI: 10.1002/dac.1127

  11. You have free access to this content

    Multimedia Networks: Protocols, Design, and Applications

    Hans W. Barz, Gregory A. Bassett, Pages: 313–344, 2016

    Published Online : 15 JAN 2016, DOI: 10.1002/9781119090151.refs

  12. Internet security meets the IP multimedia subsystem: an overview

    Security and Communication Networks

    Volume 3, Issue 2-3, March - June 2010, Pages: 185–206, Andreas Berger, Ivan Gojmerac and Oliver Jung

    Version of Record online : 11 SEP 2009, DOI: 10.1002/sec.142

  13. Effect of salinity and temperature on the growth of yearling Arctic cisco (Coregonus autumnalis) of the Alaskan Beaufort Sea

    Journal of Fish Biology

    Volume 43, Issue 3, September 1993, Pages: 463–474, R. G. Fechhelm, P. S. Fitzgerald, J. D. Bryan and B. J. Gallaway

    Version of Record online : 4 APR 2005, DOI: 10.1111/j.1095-8649.1993.tb00581.x

  14. SNMP-based enterprise IP network topology discovery

    International Journal of Network Management

    Volume 21, Issue 3, May 2011, Pages: 169–184, Suman Pandey, Mi-Jung Choi, Young J. Won and James Won-Ki Hong

    Version of Record online : 25 AUG 2010, DOI: 10.1002/nem.756

  15. Pay for Performance

    Handbook of Principles of Organizational Behavior: Indispensable Knowledge for Evidence-Based Management, Second

    Cathy C. Durham, Kathryn M. Bartol, Pages: 217–238, 2015

    Published Online : 29 AUG 2015, DOI: 10.1002/9781119206422.ch12

  16. You have free access to this content
    Wireless GINI: an educational platform for hosting virtual wireless networks

    Software: Practice and Experience

    Volume 47, Issue 1, January 2017, Pages: 21–59, Ahmed Youssef, Muthucumaru Maheswaran and Lamis Youssef

    Version of Record online : 13 APR 2016, DOI: 10.1002/spe.2399

  17. On the Internet routing protocol Enhanced Interior Gateway Routing Protocol: is it optimal?

    International Transactions in Operational Research

    Volume 13, Issue 3, May 2006, Pages: 177–194, James R. Yee

    Version of Record online : 25 MAY 2006, DOI: 10.1111/j.1475-3995.2006.00543.x

  18. You have free access to this content

    Resource Optimization and Security for Cloud Services

    Kaiqi Xiong, Pages: 181–192, 2014

    Published Online : 21 FEB 2014, DOI: 10.1002/9781118898598.biblio

  19. m-Health and Mobile Communication Systems

    M-Health: Fundamentals and Applications: Fundamentals and Applications

    Bryan Woodward, Pages: 119–188, 2016

    Published Online : 21 OCT 2016, DOI: 10.1002/9781119302889.ch4

  20. System availability assessment using stochastic models

    Applied Stochastic Models in Business and Industry

    Volume 29, Issue 2, March/April 2013, Pages: 94–109, Kishor S. Trivedi, Dong-Seong Kim and Rahul Ghosh

    Version of Record online : 31 JUL 2012, DOI: 10.1002/asmb.951