Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- network security 2 Treffer
- accuracy 1 Treffer
- algorithm optimization 1 Treffer
- anomaly detection 1 Treffer
- ant colony algorithm 1 Treffer
-
21 weitere Werte:
- back propagation 1 Treffer
- blind equalization 1 Treffer
- chaos theory 1 Treffer
- computation 1 Treffer
- control system 1 Treffer
- customer service 1 Treffer
- discriminant analysis 1 Treffer
- ensemble 1 Treffer
- extended warranty 1 Treffer
- feature extraction 1 Treffer
- feature selection 1 Treffer
- green warranty 1 Treffer
- hidden markov chain 1 Treffer
- intrusion detection 1 Treffer
- logistic model 1 Treffer
- mathematical optimization 1 Treffer
- network intrusion 1 Treffer
- network topology 1 Treffer
- non-linear analysis 1 Treffer
- particle swarm algorithm 1 Treffer
- radial basis function 1 Treffer
Sprache
Inhaltsanbieter
10 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 435-446academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 239-248academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 41-50academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 241-248academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 95-104academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 1-12academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 329-340academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 75-84academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 167-174academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 5 (2011-07-30), Heft 3, S. 23-44academicJournalZugriff: