Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- intrusion detection 2 Treffer
- intrusion detection system 2 Treffer
- algorithm 1 Treffer
- attack 1 Treffer
- big data 1 Treffer
-
19 weitere Werte:
- classification 1 Treffer
- clustering 1 Treffer
- empirical analysis 1 Treffer
- financial management 1 Treffer
- fiscal expenditure 1 Treffer
- granular computing 1 Treffer
- inference 1 Treffer
- intelligent transportation 1 Treffer
- malware detection 1 Treffer
- neighborhood 1 Treffer
- network security 1 Treffer
- new urbanization 1 Treffer
- organizational learning 1 Treffer
- privacy preserving 1 Treffer
- security 1 Treffer
- social network analysis 1 Treffer
- spam filtering 1 Treffer
- statistical features 1 Treffer
- strategic hrm 1 Treffer
Sprache
Inhaltsanbieter
12 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 385-394academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 335-342academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 375-384academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 145-150academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 281-286academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 157-168academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 95-102academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 69-76academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 63-80academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 293-318academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 329-336academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 157-166academicJournalZugriff: