Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- artificial intelligence 1 Treffer
- computer network security 1 Treffer
- computing platforms 1 Treffer
- cyberattack 1 Treffer
- cyberterrorism 1 Treffer
-
24 weitere Werte:
- data-intensive applications 1 Treffer
- edge computing 1 Treffer
- intelligent sensors 1 Treffer
- internet protocols 1 Treffer
- intrusion detection systems (computer security) 1 Treffer
- iot 1 Treffer
- microcontrollers 1 Treffer
- missing data (statistics) 1 Treffer
- mobile computing 1 Treffer
- mobile edge computing 1 Treffer
- multiple imputations 1 Treffer
- network intrusion detection 1 Treffer
- network performance 1 Treffer
- network security 1 Treffer
- orchestration 1 Treffer
- pipelines 1 Treffer
- resource allocation 1 Treffer
- resource management 1 Treffer
- survey 1 Treffer
- system integration 1 Treffer
- task offloading 1 Treffer
- taxonomy 1 Treffer
- telecommunication 1 Treffer
- tinyml 1 Treffer
Sprache
Inhaltsanbieter
5 Treffer
-
In: ACM Computing Surveys, Jg. 55 (2023-12-03), S. 1-37academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 55 (2023-12-03), S. 1-30academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 55 (2023-07-15), Heft 7, S. 1-38academicJournalZugriff:
-
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats.In: ACM Computing Surveys, Jg. 55 (2023-06-01), Heft 5, S. 1-37academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 53 (2021-07-15), Heft 4, S. 82-128academicJournalZugriff: