Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- botnet 2 Treffer
- decompilation 2 Treffer
- security 2 Treffer
- android 1 Treffer
- android application 1 Treffer
-
21 weitere Werte:
- anomaly detection 1 Treffer
- data loss prevention 1 Treffer
- defense 1 Treffer
- epidemic 1 Treffer
- equilibrium 1 Treffer
- isac 1 Treffer
- live forensics 1 Treffer
- llvm 1 Treffer
- longest common subsequence 1 Treffer
- malicious code 1 Treffer
- malware detection 1 Treffer
- network 1 Treffer
- permission 1 Treffer
- propagation 1 Treffer
- quarantine 1 Treffer
- reverse engineering 1 Treffer
- smartphone 1 Treffer
- stability 1 Treffer
- static analysis 1 Treffer
- support vector machine 1 Treffer
- weaknesses 1 Treffer
Sprache
Inhaltsanbieter
10 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 201-214academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 47-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 127-136academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 335-346academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 7-12academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 291-300academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 29-42academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-01-30), Heft 1, S. 181-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-01-30), Heft 1, S. 51-58academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 5 (2011-10-30), Heft 4, S. 91-106academicJournalZugriff: