Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 5 Treffer
- access control 2 Treffer
- cloud computing 2 Treffer
- privacy 2 Treffer
- privacy protection 2 Treffer
-
25 weitere Werte:
- reputation 2 Treffer
- analytic hierarchy 1 Treffer
- authentication 1 Treffer
- autonomy 1 Treffer
- cloud security 1 Treffer
- e-commerce 1 Treffer
- heap 1 Treffer
- heterogeneity 1 Treffer
- information security 1 Treffer
- information theory 1 Treffer
- keys 1 Treffer
- malicious attack 1 Treffer
- mobile p2p 1 Treffer
- multi-domain 1 Treffer
- qos 1 Treffer
- risk 1 Treffer
- role performance 1 Treffer
- routing protocol 1 Treffer
- similarity 1 Treffer
- sla 1 Treffer
- the internet of things 1 Treffer
- vanet 1 Treffer
- watchdog 1 Treffer
- web service selection 1 Treffer
- wireless ad hoc networks 1 Treffer
Sprache
Inhaltsanbieter
13 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 283-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 153-172academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 187-200academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 63-70academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 107-116academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 113-120academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 375-388academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 149-160academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 259-270academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 85-98academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 329-334academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 4 (2010-04-30), Heft 2, S. 39-48academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 1 (2007-07-30), Heft 1, S. 57-71academicJournalZugriff: