


default search action
BibTeX records: Denis Edgar-Nevill
@article{DBLP:journals/ijcwt/Edgar-Nevill13, author = {Denis Edgar{-}Nevill}, title = {The {EU} {ECENTRE} Project: Education as a Defensive Weapon in the War Against Cybercrime}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {4}, pages = {10--21}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013100102}, doi = {10.4018/IJCWT.2013100102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Edgar-Nevill13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QiE11, author = {Man Qi and Denis Edgar{-}Nevill}, title = {Social networking searching and privacy issues}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {74--78}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.005}, doi = {10.1016/J.ISTR.2011.09.005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QiE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/QiEWX08, author = {Man Qi and Denis Edgar{-}Nevill and Yongquan Wang and Rongsheng Xu}, title = {Tracking online trails}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {353--361}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021453}, doi = {10.1504/IJESDF.2008.021453}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/QiEWX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitsa/PetkovEMO08, author = {Doncho I. Petkov and Denis Edgar{-}Nevill and Raymond J. Madachy and Rory O'Connor}, title = {Information Systems, Software Engineering, and Systems Thinking: Challenges and Opportunities}, journal = {Int. J. Inf. Technol. Syst. Approach}, volume = {1}, number = {1}, pages = {62--78}, year = {2008}, url = {https://doi.org/10.4018/jitsa.2008010105}, doi = {10.4018/JITSA.2008010105}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitsa/PetkovEMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.