Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- aodv 2 Treffer
- blackhole attack 2 Treffer
- manet 2 Treffer
- prevention 2 Treffer
- routing 2 Treffer
-
21 weitere Werte:
- security 2 Treffer
- web application 2 Treffer
- adaption 1 Treffer
- cctv 1 Treffer
- deception technology 1 Treffer
- eyelashes 1 Treffer
- iris recognition 1 Treffer
- life cycle 1 Treffer
- monitoring 1 Treffer
- multi-level 1 Treffer
- netflow 1 Treffer
- openflow 1 Treffer
- operating system 1 Treffer
- p2p botnet 1 Treffer
- receiver 1 Treffer
- recovery 1 Treffer
- satellite 1 Treffer
- sdn 1 Treffer
- static analysis 1 Treffer
- threshold 1 Treffer
- video analysis 1 Treffer
Sprache
Inhaltsanbieter
11 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 13-20academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 321-330academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 447-456academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 181-190academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 195-202academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 59-68academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 139-152academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 119-130academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 87-96academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 53-66academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 4 (2010-11-30), Heft 4, S. 39-52academicJournalZugriff: