Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- power system 2 Treffer
- risk management 2 Treffer
- security 2 Treffer
- ahp 1 Treffer
- assets 1 Treffer
-
25 weitere Werte:
- cloud computing 1 Treffer
- combination weight 1 Treffer
- computer 1 Treffer
- cps 1 Treffer
- cryptographic module 1 Treffer
- de-identification 1 Treffer
- disaster 1 Treffer
- extenics 1 Treffer
- financial information security 1 Treffer
- fuzzy evaluation 1 Treffer
- information system 1 Treffer
- k-anonymity 1 Treffer
- monte carlo simulation 1 Treffer
- network security 1 Treffer
- optimization model 1 Treffer
- privacy 1 Treffer
- safety 1 Treffer
- security level 1 Treffer
- security requirements 1 Treffer
- simulation 1 Treffer
- sla 1 Treffer
- smart grid 1 Treffer
- system dynamics 1 Treffer
- typhoon 1 Treffer
- weight 1 Treffer
Sprache
Inhaltsanbieter
12 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 251-262academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 215-224academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 197-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 1-10academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 179-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 155-164academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 289-296academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 193-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 41-48academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 243-256academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-10-30), Heft 4, S. 191-200academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 185-190academicJournalZugriff: