Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- intrusion detection 7 Treffer
- attack and defense strategy 4 Treffer
- attack model 4 Treffer
- attack intention 3 Treffer
- situation evaluation 3 Treffer
-
45 weitere Werte:
- threat evaluation 3 Treffer
- authentication 2 Treffer
- cryptanalysis 2 Treffer
- intrusion detection system 2 Treffer
- key predistribution 2 Treffer
- neural network 2 Treffer
- petri net 2 Treffer
- smart card 2 Treffer
- vulnerability 2 Treffer
- wireless sensor networks 2 Treffer
- active defense 1 Treffer
- adaptive detection 1 Treffer
- address resolution 1 Treffer
- android 1 Treffer
- anomaly detection 1 Treffer
- arp 1 Treffer
- attack graph 1 Treffer
- back propagation neural network 1 Treffer
- big data 1 Treffer
- classification 1 Treffer
- cloud computing service 1 Treffer
- cloud model 1 Treffer
- clustering 1 Treffer
- correlation analysis 1 Treffer
- credential 1 Treffer
- cross-layer 1 Treffer
- cryptography 1 Treffer
- cryptography algorithm 1 Treffer
- data mining 1 Treffer
- ddos 1 Treffer
- distributed sensor network 1 Treffer
- elliptic curves 1 Treffer
- embedded 1 Treffer
- empirical analysis 1 Treffer
- evidence theory 1 Treffer
- feature selection 1 Treffer
- fiscal expenditure 1 Treffer
- game theory 1 Treffer
- graph theory 1 Treffer
- hash chain 1 Treffer
- healthcare 1 Treffer
- heterogeneous network 1 Treffer
- hidden markov chain 1 Treffer
- ids 1 Treffer
- information security 1 Treffer
Sprache
Inhaltsanbieter
52 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 347-358academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 317-324academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 303-316academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 153-164academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 99-108academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 23-32academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 77-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 435-446academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 375-384academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 193-204academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 315-326academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 215-224academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 193-202academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 135-142academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 51-62academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 183-192academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 155-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 371-390academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 419-428academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 251-270academicJournalZugriff: