Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 120 Treffer
- cloud computing 53 Treffer
- authentication 52 Treffer
- network security 52 Treffer
- intrusion detection 38 Treffer
-
45 weitere Werte:
- access control 26 Treffer
- encryption 26 Treffer
- information security 22 Treffer
- smart card 21 Treffer
- cryptography 20 Treffer
- privacy 20 Treffer
- wireless sensor networks 19 Treffer
- rfid 18 Treffer
- steganography 18 Treffer
- e-commerce 13 Treffer
- svm 13 Treffer
- trust 13 Treffer
- aes 12 Treffer
- anonymity 12 Treffer
- data mining 12 Treffer
- internet of things 12 Treffer
- risk assessment 12 Treffer
- detection 11 Treffer
- digital watermarking 11 Treffer
- image encryption 11 Treffer
- key management 11 Treffer
- watermarking 11 Treffer
- feature extraction 10 Treffer
- genetic algorithm 10 Treffer
- malware 10 Treffer
- neural network 10 Treffer
- robustness 10 Treffer
- support vector machine 10 Treffer
- android 9 Treffer
- anomaly detection 9 Treffer
- biometrics 9 Treffer
- face recognition 9 Treffer
- performance evaluation 9 Treffer
- privacy protection 9 Treffer
- cloud storage 8 Treffer
- confidentiality 8 Treffer
- cryptanalysis 8 Treffer
- decryption 8 Treffer
- manet 8 Treffer
- wireless sensor network 8 Treffer
- aodv 7 Treffer
- bayesian network 7 Treffer
- data security 7 Treffer
- ddos 7 Treffer
- digital signature 7 Treffer
Sprache
Inhaltsanbieter
1.468 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 147-154academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 107-118academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 67-76academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 77-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 37-46academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 47-56academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 29-36academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 21-28academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 13-20academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 1-12academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 265-274academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 301-308academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 175-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 321-330academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 309-320academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 331-342academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 285-294academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 257-264academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 295-300academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 229-242academicJournalZugriff: