Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 120 Treffer
- cloud computing 53 Treffer
- authentication 52 Treffer
- network security 52 Treffer
- intrusion detection 38 Treffer
-
45 weitere Werte:
- access control 26 Treffer
- encryption 26 Treffer
- information security 22 Treffer
- smart card 21 Treffer
- cryptography 20 Treffer
- privacy 20 Treffer
- wireless sensor networks 19 Treffer
- rfid 18 Treffer
- steganography 18 Treffer
- e-commerce 13 Treffer
- svm 13 Treffer
- trust 13 Treffer
- aes 12 Treffer
- anonymity 12 Treffer
- data mining 12 Treffer
- internet of things 12 Treffer
- risk assessment 12 Treffer
- detection 11 Treffer
- digital watermarking 11 Treffer
- image encryption 11 Treffer
- key management 11 Treffer
- watermarking 11 Treffer
- feature extraction 10 Treffer
- genetic algorithm 10 Treffer
- malware 10 Treffer
- neural network 10 Treffer
- robustness 10 Treffer
- support vector machine 10 Treffer
- android 9 Treffer
- anomaly detection 9 Treffer
- biometrics 9 Treffer
- face recognition 9 Treffer
- performance evaluation 9 Treffer
- privacy protection 9 Treffer
- cloud storage 8 Treffer
- confidentiality 8 Treffer
- cryptanalysis 8 Treffer
- decryption 8 Treffer
- manet 8 Treffer
- wireless sensor network 8 Treffer
- aodv 7 Treffer
- bayesian network 7 Treffer
- data security 7 Treffer
- ddos 7 Treffer
- digital signature 7 Treffer
Sprache
Inhaltsanbieter
1.468 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 409-418academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 389-398academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 399-408academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 369-376academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 347-358academicJournalZugriff:
-
Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian TheoryIn: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 359-368academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 377-388academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 335-346academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 299-310academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 311-322academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 289-298academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 323-334academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 241-250academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 251-260academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 283-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 261-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 219-228academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 229-240academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 187-206academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 173-186academicJournalZugriff: