Part of the Information Security Commons
Authors in Information Security
| Last Name | Author | Articles | Works | Related Disciplines |
|---|---|---|---|---|
| Chen Bo Chen | Bo Chen (8) | 8 | Computer Sciences | |
| Jia Shijie Jia | Shijie Jia (6) | 6 | Computer Sciences | |
| Zhang Fengwei Zhang | Fengwei Zhang (3) | 3 | ||
| Xia Luning Xia | Luning Xia (3) | 3 | Computer Sciences | |
| et. al. | et. al. (3) | 3 | ||
| Cai Yu Cai | Yu Cai (2) | 2 | Curriculum and Instruction | |
| Lin Jingqiang Lin | Jingqiang Lin (2) | 2 | ||
| Chang Bing Chang | Bing Chang (2) | 2 | ||
| Guan Le Guan | Le Guan (2) | 2 | ||
| Luo Bo Luo | Bo Luo (2) | 2 | ||
| Song Min Song | Min Song (2) | 2 | Computer Sciences | |
| Liu Peng Liu | Peng Liu (2) | 2 | ||
| Wall Jeffrey D. Wall | Jeffrey D. Wall (2) | 2 | Business | |
| Jiang Peng Jiang | Peng Jiang (1) | 1 | ||
| Singh Rahul Singh | Rahul Singh (1) | 1 | Business | |
| Wang Suhang Wang | Suhang Wang (1) | 1 | ||
| Shu Kai Shu | Kai Shu (1) | 1 | ||
| Lowry Paul Benjamin Lowry | Paul Benjamin Lowry (1) | 1 | Business | |
| Qiu Zhitao Qiu | Zhitao Qiu (1) | 1 | Computer Sciences | |
| Tian Yangguang Tian | Yangguang Tian (1) | 1 | ||
| et. al. Huan Li | Huan Li (1) | 1 | ||
| Wagner Christian Wagner | Christian Wagner (1) | 1 | Business | |
| Arney Chad A. Arney | Chad A. Arney (1) | 1 | Databases and Information Systems | |
| Mirkovski Kristijan Mirkovski | Kristijan Mirkovski (1) | 1 | Business | |
| Bonamy Paul J. Bonamy | Paul J. Bonamy (1) | 1 | OS and Networks | |
| Xu Xiaohua Xu | Xiaohua Xu (1) | 1 | Computer Sciences | |
| Zhu Wen-Tao Zhu | Wen-Tao Zhu (1) | 1 | ||
| Arney Todd O. Arney | Todd O. Arney (1) | 1 | ||
| Wang Xinli Wang | Xinli Wang (1) | 1 | Databases and Information Systems | |
| Zhang Qionglu Zhang | Qionglu Zhang (1) | 1 | ||
| Jiang Ling Jiang | Ling Jiang (1) | 1 | Business | |
| Li Yingjiu Li | Yingjiu Li (1) | 1 | ||
| Meng Xuying Meng | Xuying Meng (1) | 1 | ||
| Xin ChunSheng Xin | ChunSheng Xin (1) | 1 | ||
| Li Jundong Li | Jundong Li (1) | 1 |