Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- intrusion detection 8 Treffer
- attack and defense strategy 4 Treffer
- attack model 4 Treffer
- attack intention 3 Treffer
- situation evaluation 3 Treffer
-
45 weitere Werte:
- threat evaluation 3 Treffer
- authentication 2 Treffer
- cryptanalysis 2 Treffer
- information security 2 Treffer
- intrusion detection system 2 Treffer
- key agreement 2 Treffer
- key predistribution 2 Treffer
- neural network 2 Treffer
- petri net 2 Treffer
- smart card 2 Treffer
- vulnerability 2 Treffer
- wireless sensor networks 2 Treffer
- active defense 1 Treffer
- adaptive detection 1 Treffer
- address resolution 1 Treffer
- android 1 Treffer
- anomaly detection 1 Treffer
- arp 1 Treffer
- attack graph 1 Treffer
- back propagation neural network 1 Treffer
- big data 1 Treffer
- classification 1 Treffer
- cloud computing service 1 Treffer
- cloud model 1 Treffer
- clustering 1 Treffer
- correlation analysis 1 Treffer
- credential 1 Treffer
- cross-layer 1 Treffer
- cryptography 1 Treffer
- cryptography algorithm 1 Treffer
- data mining 1 Treffer
- ddos 1 Treffer
- decision tree 1 Treffer
- distributed sensor network 1 Treffer
- elliptic curves 1 Treffer
- embedded 1 Treffer
- empirical analysis 1 Treffer
- evidence theory 1 Treffer
- feature selection 1 Treffer
- fiscal expenditure 1 Treffer
- game theory 1 Treffer
- graph theory 1 Treffer
- hash chain 1 Treffer
- healthcare 1 Treffer
- heterogeneous network 1 Treffer
Verlag
Publikation
Inhaltsanbieter
55 Treffer
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 175-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 17-28academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 347-358academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-12-31), Heft 12, S. 201-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 317-324academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 303-316academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 153-164academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 99-108academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 23-32academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 77-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 435-446academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 375-384academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 193-204academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 315-326academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 215-224academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 193-202academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 135-142academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 51-62academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 183-192academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 155-166academicJournalZugriff: