Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- machine learning 16 Treffer
- deep learning 15 Treffer
- detection 10 Treffer
- malware detection 10 Treffer
- ransomware 8 Treffer
-
45 weitere Werte:
- computer security 7 Treffer
- android 6 Treffer
- artificial neural networks 6 Treffer
- dynamic analysis 6 Treffer
- feature selection 6 Treffer
- security 6 Treffer
- taxonomy 6 Treffer
- malware analysis 5 Treffer
- android (operating system) 4 Treffer
- anti-malware (computer software) 4 Treffer
- arms race 4 Treffer
- binary codes 4 Treffer
- computer software 4 Treffer
- encryption protocols 4 Treffer
- evasion attacks 4 Treffer
- feature extraction 4 Treffer
- internet security 4 Treffer
- introspection 4 Treffer
- malware prevention 4 Treffer
- ransom 4 Treffer
- social engineering (fraud) 4 Treffer
- advanced persistent threats 3 Treffer
- adversarial 3 Treffer
- algorithms 3 Treffer
- artificial intelligence 3 Treffer
- authorship attribution 3 Treffer
- community detection 3 Treffer
- computer hacking 3 Treffer
- datasets 3 Treffer
- deep reinforcement learning 3 Treffer
- few-shot 3 Treffer
- information technology 3 Treffer
- reinforcement learning 3 Treffer
- semi-supervised 3 Treffer
- unsupervised 3 Treffer
- adversarial machine learning 2 Treffer
- analysis 2 Treffer
- android malware 2 Treffer
- antivirus software 2 Treffer
- behavioral analysis 2 Treffer
- binary analysis 2 Treffer
- business enterprises 2 Treffer
- business revenue 2 Treffer
- classification 2 Treffer
- code search 2 Treffer
Sprache
Inhaltsanbieter
60 Treffer
-
In: ACM Computing Surveys, Jg. 56 (2024-06-01), Heft 6, S. 1-33Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 56 (2024-08-01), Heft 8, S. 1-36Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 56 (2024-02-01), Heft 2, S. 1-29Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 55 (2023-08-01), Heft 8, S. 1-36Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 56 (2024-02-01), Heft 2, S. 1-37Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 54 (2022-12-01), Heft 9, S. 1-36Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 54 (2022-07-01), Heft 6, S. 1-35Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 54 (2022-01-03), S. 1-37Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 55 (2023-08-01), Heft 8, S. 1-28Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 55 (2023-06-01), Heft 5, S. 1-45Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 55 (2023), Heft 1, S. 1-35Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 54 (2022-07-01), Heft 6, S. 1-36Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 54 (2022-04-01), Heft 3, S. 1-38Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 53 (2021-11-15), Heft 6, S. 1-36Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 52 (2020-11-01), Heft 6, S. 1-28Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 52 (2020-09-01), Heft 5, S. 1-48Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 52 (2020-07-01), Heft 4, S. 1-36Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 52 (2020-03-15), Heft 2, S. 1-25Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 52 (2020-01-15), Heft 1, S. 691-725Online academicJournalZugriff:
-
In: ACM Computing Surveys, Jg. 51 (2019-07-01), Heft 4, S. 1-34Online academicJournalZugriff: