Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- data aggregation 4 Treffer
- key predistribution 4 Treffer
- key management 3 Treffer
- network lifetime 3 Treffer
- structural health monitoring 3 Treffer
-
45 weitere Werte:
- clustering 2 Treffer
- compressive sensing 2 Treffer
- dv-hop algorithm 2 Treffer
- ieee 802.15.4 2 Treffer
- intrusion detection 2 Treffer
- lr-wpan 2 Treffer
- network security 2 Treffer
- security 2 Treffer
- accuracy 1 Treffer
- agility 1 Treffer
- authentication scheme 1 Treffer
- chaotic time series 1 Treffer
- cluster formation 1 Treffer
- cluster head 1 Treffer
- clustering routing 1 Treffer
- communication capacity 1 Treffer
- copyright protection 1 Treffer
- coverage rate 1 Treffer
- ctp 1 Treffer
- data authentication 1 Treffer
- data confidentiality 1 Treffer
- data integrity 1 Treffer
- data privacy 1 Treffer
- data replication 1 Treffer
- delay 1 Treffer
- density 1 Treffer
- digital watermarking 1 Treffer
- energy aware 1 Treffer
- energy efficiency 1 Treffer
- energy harvesting 1 Treffer
- frequency hopping 1 Treffer
- game theory 1 Treffer
- gaussian distribution 1 Treffer
- genetic algorithm 1 Treffer
- hash chain 1 Treffer
- heterogeneous 1 Treffer
- hierarchical clustering 1 Treffer
- lookup table 1 Treffer
- mac protocol 1 Treffer
- matrix 1 Treffer
- multi-agent system 1 Treffer
- multi-target 1 Treffer
- muti-hop 1 Treffer
- noise reduction 1 Treffer
- operational mode 1 Treffer
Verlag
Publikation
- international journal of security and its applications 19 Treffer
- international journal of hybrid information technology 9 Treffer
- international journal of future generation communication and networking 3 Treffer
- international journal of control and automation 2 Treffer
- international journal of bio-science and bio-technology 1 Treffer
- 5 weitere Werte:
Inhaltsanbieter
39 Treffer
-
In: International Journal of Control and Automation, Jg. 9 (2016-12-31), Heft 12, S. 383-394academicJournalZugriff:
-
In: International Journal of Smart Home, Jg. 10 (2016-09-30), Heft 9, S. 179-196academicJournalZugriff:
-
In: International Journal of Future Generation Communication and Networking, Jg. 9 (2016-08-30), Heft 8, S. 179-186academicJournalZugriff:
-
In: International Journal of Future Generation Communication and Networking, Jg. 9 (2016-06-30), Heft 6, S. 17-28academicJournalZugriff:
-
In: International Journal of Database Theory and Application, Jg. 8 (2015-08-30), Heft 4, S. 179-182academicJournalZugriff:
-
In: International Journal of Future Generation Communication and Networking, Jg. 8 (2015-06-30), Heft 3, S. 179-190academicJournalZugriff:
-
In: International Journal of Control and Automation, Jg. 7 (2014-02-28), Heft 2, S. 175-188academicJournalZugriff:
-
In: International Journal of Bio-Science and Bio-Technology, Jg. 5 (2013-10-30), Heft 5, S. 171-178academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 17-28academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 5 (2012-10-30), Heft 4, S. 171-178academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 3 (2010-01-30), Heft 1, S. 29-48academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 131-142academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 225-234academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-05-30), Heft 5, S. 213-222academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 105-116academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 411-422academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 125-132academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 381-394academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-09-30), Heft 9, S. 289-302academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 275-284academicJournalZugriff: