Cited By
View all- Udo GBagchi KMaity M(2014)Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National CultureJournal of Business Ethics10.1007/s10551-014-2484-1135:3(517-541)Online publication date: 9-Dec-2014
- Tulasidas SMackay RCraw PHudson CGkatzidou VBalachandran W(2013)Process of Designing Robust, Dependable, Safe and Secure Software for Medical Devices: Point of Care Testing Device as a Case StudyJournal of Software Engineering and Applications10.4236/jsea.2013.69A00106:09(1-13)Online publication date: 2013
- Mander TCheung HHamlyn ALin Wang Cungang Yang Cheung R(2008)New network cyber-security architecture for smart distribution system operations2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century10.1109/PES.2008.4596859(1-8)Online publication date: Jul-2008
- Show More Cited By