Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- deep learning 4 Treffer
- internet security 4 Treffer
- network intrusion detection 4 Treffer
- network security 4 Treffer
- adversarial machine learning 2 Treffer
-
30 weitere Werte:
- analytic hierarchy process 2 Treffer
- computing 2 Treffer
- computing platforms 2 Treffer
- cyber physical systems 2 Treffer
- cyberattack 2 Treffer
- cyber-attacks 2 Treffer
- cybersecurity 2 Treffer
- cyberterrorism 2 Treffer
- datasets 2 Treffer
- electronic data processing 2 Treffer
- encryption protocols 2 Treffer
- instructional systems 2 Treffer
- internet of things 2 Treffer
- intrusion detection systems (computer security) 2 Treffer
- location estimation 2 Treffer
- malware 2 Treffer
- mobile malware 2 Treffer
- national institute of standards & technology (u.s.) 2 Treffer
- network performance 2 Treffer
- neural networks 2 Treffer
- representation learning 2 Treffer
- risk assessment 2 Treffer
- scientific community 2 Treffer
- searchable encryption 2 Treffer
- threat analysis 2 Treffer
- user privacy 2 Treffer
- attack graphs 1 Treffer
- network analytics 1 Treffer
- network function 1 Treffer
- website fingerprinting 1 Treffer
Sprache
Inhaltsanbieter
4 Treffer
-
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats.In: ACM Computing Surveys, Jg. 55 (2023-06-01), Heft 5, S. 1-37Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 54 (2022-07-01), Heft 6, S. 1-35Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 55 (2023-09-01), Heft 9, S. 1-36Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 52 (2020-11-01), Heft 6, S. 1-28Online academicJournalZugriff: