Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 120 Treffer
- cloud computing 53 Treffer
- authentication 52 Treffer
- network security 52 Treffer
- intrusion detection 38 Treffer
-
45 weitere Werte:
- access control 26 Treffer
- encryption 26 Treffer
- information security 22 Treffer
- smart card 21 Treffer
- cryptography 20 Treffer
- privacy 20 Treffer
- wireless sensor networks 19 Treffer
- rfid 18 Treffer
- steganography 18 Treffer
- e-commerce 13 Treffer
- svm 13 Treffer
- trust 13 Treffer
- aes 12 Treffer
- anonymity 12 Treffer
- data mining 12 Treffer
- internet of things 12 Treffer
- risk assessment 12 Treffer
- detection 11 Treffer
- digital watermarking 11 Treffer
- image encryption 11 Treffer
- key management 11 Treffer
- watermarking 11 Treffer
- feature extraction 10 Treffer
- genetic algorithm 10 Treffer
- malware 10 Treffer
- neural network 10 Treffer
- robustness 10 Treffer
- support vector machine 10 Treffer
- android 9 Treffer
- anomaly detection 9 Treffer
- biometrics 9 Treffer
- face recognition 9 Treffer
- performance evaluation 9 Treffer
- privacy protection 9 Treffer
- cloud storage 8 Treffer
- confidentiality 8 Treffer
- cryptanalysis 8 Treffer
- decryption 8 Treffer
- manet 8 Treffer
- wireless sensor network 8 Treffer
- aodv 7 Treffer
- bayesian network 7 Treffer
- data security 7 Treffer
- ddos 7 Treffer
- digital signature 7 Treffer
Sprache
Inhaltsanbieter
1.468 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 81-96academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 207-218academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 153-172academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 129-140academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 97-110academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 69-80academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 53-68academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 141-152academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 111-128academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 21-30academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 43-52academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 31-42academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 13-20academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 1-12academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 317-324academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 293-302academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 303-316academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 281-292academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 267-280academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 249-266academicJournalZugriff: