Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- attribute-based encryption 2 Treffer
- access structure 1 Treffer
- big data 1 Treffer
- cloud service 1 Treffer
- context-aware 1 Treffer
-
11 weitere Werte:
- distributed computing 1 Treffer
- education information 1 Treffer
- evidence theory 1 Treffer
- exponential distribution 1 Treffer
- fault diagnosis 1 Treffer
- fuzzy logic 1 Treffer
- information security 1 Treffer
- internet of things 1 Treffer
- quantitative evaluation 1 Treffer
- situation assessment 1 Treffer
- trust evaluation 1 Treffer
Sprache
Inhaltsanbieter
7 Treffer
-
Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian TheoryIn: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 359-368academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 165-174academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 129-138academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 283-292academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 261-274academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 31-42academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-01-30), Heft 1, S. 213-224academicJournalZugriff: