Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- feature selection 3 Treffer
- intrusion detection systems (computer security) 3 Treffer
- deep learning 2 Treffer
- algorithms 1 Treffer
- anomaly detection 1 Treffer
-
27 weitere Werte:
- blockchain 1 Treffer
- blockchains 1 Treffer
- cnn 1 Treffer
- computer networks 1 Treffer
- cyberattack 1 Treffer
- cybersecurity 1 Treffer
- data acquisition systems 1 Treffer
- feature extraction 1 Treffer
- histograms 1 Treffer
- information & communication technologies 1 Treffer
- information retrieval 1 Treffer
- internet of medical things (iomt) 1 Treffer
- internet of things 1 Treffer
- internet security 1 Treffer
- intrusion detection 1 Treffer
- intrusion detection system 1 Treffer
- iot 1 Treffer
- kpca 1 Treffer
- lstm 1 Treffer
- malware 1 Treffer
- malware detection 1 Treffer
- ransomware 1 Treffer
- recurrent neural networks 1 Treffer
- scada 1 Treffer
- security 1 Treffer
- security systems 1 Treffer
- software analytics 1 Treffer
Sprache
Inhaltsanbieter
6 Treffer
-
In: Computer Systems Science & Engineering, Jg. 47 (2023-11-01), Heft 2, S. 1593-1609Online academicJournalZugriff:
-
In: Computer Systems Science & Engineering, Jg. 46 (2023-09-01), Heft 3, S. 3583-3598Online academicJournalZugriff:
-
In: Computer Systems Science & Engineering, Jg. 46 (2023-09-01), Heft 3, S. 3103-3119Online academicJournalZugriff:
-
In: Computer Systems Science & Engineering, Jg. 45 (2023-05-01), Heft 2, S. 2235-2247Online academicJournalZugriff:
-
In: Computer Systems Science & Engineering, Jg. 44 (2023-02-01), Heft 2, S. 1679-1689Online academicJournalZugriff:
-
In: Computer Systems Science & Engineering, Jg. 37 (2021-04-01), Heft 1, S. 33-46Online academicJournalZugriff: