Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 119 Treffer
- cloud computing 53 Treffer
- authentication 52 Treffer
- network security 52 Treffer
- intrusion detection 38 Treffer
-
45 weitere Werte:
- access control 26 Treffer
- encryption 26 Treffer
- information security 22 Treffer
- smart card 21 Treffer
- cryptography 20 Treffer
- privacy 20 Treffer
- wireless sensor networks 19 Treffer
- rfid 18 Treffer
- steganography 18 Treffer
- e-commerce 13 Treffer
- svm 13 Treffer
- trust 13 Treffer
- aes 12 Treffer
- anonymity 12 Treffer
- data mining 12 Treffer
- internet of things 12 Treffer
- risk assessment 12 Treffer
- detection 11 Treffer
- digital watermarking 11 Treffer
- image encryption 11 Treffer
- key management 11 Treffer
- watermarking 11 Treffer
- feature extraction 10 Treffer
- genetic algorithm 10 Treffer
- neural network 10 Treffer
- robustness 10 Treffer
- support vector machine 10 Treffer
- anomaly detection 9 Treffer
- biometrics 9 Treffer
- face recognition 9 Treffer
- malware 9 Treffer
- performance evaluation 9 Treffer
- privacy protection 9 Treffer
- android 8 Treffer
- cloud storage 8 Treffer
- confidentiality 8 Treffer
- cryptanalysis 8 Treffer
- decryption 8 Treffer
- manet 8 Treffer
- wireless sensor network 8 Treffer
- aodv 7 Treffer
- bayesian network 7 Treffer
- data security 7 Treffer
- ddos 7 Treffer
- digital signature 7 Treffer
Inhaltsanbieter
1.464 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 173-186academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 143-152academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 175-186academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 175-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 173-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 171-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 17-26academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 179-196academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 173-182academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 171-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 173-190academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 175-196academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 175-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 177-186academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 179-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 175-186academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 179-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 17-36academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 175-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 175-184academicJournalZugriff: