Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- cloud computing 2 Treffer
- adaptive detection 1 Treffer
- anomaly 1 Treffer
- clustering 1 Treffer
- discriminant analysis 1 Treffer
-
18 weitere Werte:
- hacking 1 Treffer
- hmm 1 Treffer
- intrusion detection 1 Treffer
- live forensics 1 Treffer
- local outlier factor 1 Treffer
- malware 1 Treffer
- model 1 Treffer
- network security 1 Treffer
- neural network 1 Treffer
- online learning 1 Treffer
- operating system 1 Treffer
- principal components analysis 1 Treffer
- security 1 Treffer
- spam 1 Treffer
- support vector machine (svm) 1 Treffer
- virtual machine 1 Treffer
- virtual machine (vm) 1 Treffer
- vm 1 Treffer
Sprache
Inhaltsanbieter
9 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 173-186academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 41-50academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 75-86academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 175-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 115-128academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 109-118academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 279-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-01-30), Heft 1, S. 181-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 3 (2009-07-30), Heft 3, S. 35-53academicJournalZugriff: