Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 120 Treffer
- cloud computing 53 Treffer
- authentication 52 Treffer
- network security 52 Treffer
- intrusion detection 38 Treffer
-
45 weitere Werte:
- access control 26 Treffer
- encryption 26 Treffer
- information security 22 Treffer
- smart card 21 Treffer
- cryptography 20 Treffer
- privacy 20 Treffer
- wireless sensor networks 19 Treffer
- rfid 18 Treffer
- steganography 18 Treffer
- e-commerce 13 Treffer
- svm 13 Treffer
- trust 13 Treffer
- aes 12 Treffer
- anonymity 12 Treffer
- data mining 12 Treffer
- internet of things 12 Treffer
- risk assessment 12 Treffer
- detection 11 Treffer
- digital watermarking 11 Treffer
- image encryption 11 Treffer
- key management 11 Treffer
- watermarking 11 Treffer
- feature extraction 10 Treffer
- genetic algorithm 10 Treffer
- malware 10 Treffer
- neural network 10 Treffer
- robustness 10 Treffer
- support vector machine 10 Treffer
- android 9 Treffer
- anomaly detection 9 Treffer
- biometrics 9 Treffer
- face recognition 9 Treffer
- performance evaluation 9 Treffer
- privacy protection 9 Treffer
- cloud storage 8 Treffer
- confidentiality 8 Treffer
- cryptanalysis 8 Treffer
- decryption 8 Treffer
- manet 8 Treffer
- wireless sensor network 8 Treffer
- aodv 7 Treffer
- bayesian network 7 Treffer
- data security 7 Treffer
- ddos 7 Treffer
- digital signature 7 Treffer
Sprache
Inhaltsanbieter
1.468 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 341-350academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 331-340academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 303-320academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 289-302academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 271-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 321-330academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 191-206academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 207-214academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 261-270academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 237-248academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 249-260academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 215-226academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 155-168academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 169-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 227-236academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 181-190academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 135-146academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 89-106academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 119-134academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 57-66academicJournalZugriff: