Year of publication
Source
Subject
Type of material
Licence
1–50 of 1,398 hits
Sort by:
Sort by:
-
Invisible Security Ink Based on Water‐Soluble Graphitic Carbon Nitride Quantum Dots
Wiley | 2016|Keywords: Datensicherheit -
Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers
Tema Archive | 2011|Keywords: Datensicherheit -
Reversible Response of Luminescent Terbium(III)–Nanocellulose Hydrogels to Anions for Latent Fingerprint Detection and Encryption
Wiley | 2018|Keywords: Datensicherheit -
Random effects logistic regression model for anomaly detection
Tema Archive | 2010|Keywords: Datensicherheit -
Selective image encryption in fractional wavelet domain
Tema Archive | 2011|Keywords: Datensicherheit -
Information security incident management: Current practice as reported in the literature
Tema Archive | 2014|Keywords: Datensicherheit -
In-packet bloom filters: Design and networking applications
Tema Archive | 2011|Keywords: Datensicherheit -
False positive reduction in intrusion detection system: a survey
Tema Archive | 2009|Keywords: Datensicherheit -
An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream
Tema Archive | 2011|Keywords: Datensicherheit -
A technique for detecting new attacks in low-interaction honeypot traffic
Tema Archive | 2009|Keywords: Datensicherheit -
Building lightweight intrusion detection system based on principal component analysis and C4.5 algorithm
Tema Archive | 2007|Keywords: Datensicherheit -
Compressing Attack Graphs Through Reference Encoding
Tema Archive | 2010|Keywords: Datensicherheit -
Security analysis and improvement on a double-random phase-encoding technique based information hiding method
Tema Archive | 2009|Keywords: Datensicherheit -
Priority-aware optical shared protection: an offline evaluation study
Tema Archive | 2009|Keywords: Datensicherheit -
Network anomaly detection using dissimilarity-based one-class SVM classifier
Tema Archive | 2009|Keywords: Datensicherheit -
Genetic algorithm-based clustering approach for k-anonymization
Tema Archive | 2009|Keywords: Datensicherheit -
Image data preparation for intelligent security systems
Tema Archive | 2008|Keywords: Datensicherheit -
Component forensics (theory, methodologies, and applications)
Tema Archive | 2009|Keywords: Datensicherheit -
Long-distance quantum communication with atomic ensembles and linear optics
Tema Archive | 2001|Keywords: Datensicherheit -
Ein Modell zur dynamischen Investitionsrechnung von IT-Sicherheitsmaßnahmen
Tema Archive | 2007|Keywords: Datensicherheit -
Fingerprint biometric authentication based on local global graphs
Tema Archive | 2009|Keywords: Datensicherheit -
A preliminary study of factors affecting the performance of a playback attack detector
Tema Archive | 2008|Keywords: Datensicherheit -
A Hybrid Model of RST and DST with its Application in Intrusion Detection
Tema Archive | 2010|Keywords: Datensicherheit -
Dynamic probabilistic packet marking for efficient IP traceback
Tema Archive | 2007|Keywords: Datensicherheit -
Privacy-preserving Clone Detection for RFID-enabled Supply Chains
Tema Archive | 2010|Keywords: Datensicherheit -
A New Secure Transmission for Big Data Based on Nested Sampling and Coprime Sampling
Tema Archive | 2013|Keywords: Datensicherheit -
The Model of Trusted Network Connect Based on Credibility of the Hierarchy
Tema Archive | 2010|Keywords: Datensicherheit -
New solution for password key transferring in steganography methods
Tema Archive | 2007|Keywords: Datensicherheit -
Image sharing scheme based on discrete fractional random transform
Tema Archive | 2010|Keywords: Datensicherheit -
A highly accurate and computationally efficient approach for unconstrained iris segmentation
Tema Archive | 2010|Keywords: Datensicherheit -
Graph based metrics for intrusion response measures in computer networks
Tema Archive | 2007|Keywords: Datensicherheit -
A service self-optimization algorithm based on autonomic computing
Tema Archive | 2009|Keywords: Datensicherheit -
Data hiding in scrambled images: A new double layer security data hiding technique
Tema Archive | 2014|Keywords: Datensicherheit -
Payload modeling for network intrusion detection systems
Tema Archive | 2009|Keywords: Datensicherheit -
High Embedding Reversible Data Hiding Scheme for JPEG
Tema Archive | 2010|Keywords: Datensicherheit -
A flexible H.264/AVC compressed video watermarking scheme using particle swarm optimization based dither modulation
Tema Archive | 2011|Keywords: Datensicherheit -
Anomaly Detection Using Chi-square Values Based on the Typical Features and the Time Deviation
Tema Archive | 2011|Keywords: Datensicherheit -
How Bad Are Selfish Investments in Network Security?
Tema Archive | 2011|Keywords: Datensicherheit -
Joint watermarking and encryption of color images in the Fibonacci-Haar domain
Tema Archive | 2009|Keywords: Datensicherheit -
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
Tema Archive | 2005|Keywords: Datensicherheit -
Generalized corruption models in secure multi-party computation
Tema Archive | 2010|Keywords: Datensicherheit -
Security solutions for uplink- and downlink-traffic in wireless sensor networks
Tema Archive | 2010|Keywords: Datensicherheit -
Using data fusion for awareness of intrusion in large-scale network
Tema Archive | 2008|Keywords: Datensicherheit -
Reconciling Belief and Vulnerability in Information Flow
Tema Archive | 2010|Keywords: Datensicherheit -
A testing framework for background subtraction algorithms comparison in intrusion detection context
Tema Archive | 2011|Keywords: Datensicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.