Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
- Entferne Filter: Verlag: 보안공학연구지원센터(ijsia)
- Entferne Filter: Thema: support vector machine
- Entferne Filter: Art der Quelle: eBooks
- Entferne Filter: Art der Quelle: Videos
- Entferne Filter: Art der Quelle: Academic Journals
- Entferne Filter: Art der Quelle: News
- Entferne Filter: Art der Quelle: Magazines
Weniger Treffer
Art der Quelle
Thema
- bagging 1 Treffer
- behavior characteristics 1 Treffer
- botnet 1 Treffer
- cloud computing 1 Treffer
- dimension reduction 1 Treffer
-
15 weitere Werte:
- distributed computing 1 Treffer
- ensemble learning 1 Treffer
- genetic algorithms 1 Treffer
- head detection 1 Treffer
- identity authentication 1 Treffer
- intrusion detection 1 Treffer
- intrusion detection system 1 Treffer
- kernel principal component analysis 1 Treffer
- malware 1 Treffer
- neighborhood rough set 1 Treffer
- particle swarm optimization 1 Treffer
- pedestrian detection 1 Treffer
- recognition 1 Treffer
- security 1 Treffer
- traffic classification 1 Treffer
Sprache
Inhaltsanbieter
10 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 251-260academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 295-300academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 29-36academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 243-252academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 237-246academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 31-44academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 225-234academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 295-302academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 193-204academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-01-30), Heft 1, S. 51-58academicJournalZugriff: